source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/TeraText | TeraText is a non-relational text database. It is used to store and search through large amounts of textual data. It was originally developed at Royal Melbourne Institute of Technology.
TeraText operation utilises a heavy client server model. A basic setup can consist of a Content Server (CS), Administration Interface, Application Server (AS), Security Server (SLS) and a Boot Server (boots).
Individual servers communicate with each other using the standard Z39.50 protocol. Administration is through the HTTP interface.
References
Proprietary database management systems |
https://en.wikipedia.org/wiki/Audio%20over%20IP | Audio over IP (AoIP) is the distribution of digital audio across an IP network such as the Internet. It is used increasingly to provide high-quality audio feeds over long distances. The application is also known as audio contribution over IP (ACIP) in reference to the programming contributions made by field reporters and remote events. Audio quality and latency are key issues for contribution links. In the past, these links have made use of ISDN services but these have become increasingly difficult or expensive to obtain.
Many proprietary systems came into existence for transporting high-quality audio over IP based on Transmission Control Protocol (TCP), User Datagram Protocol (UDP) or Real-time Transport Protocol (RTP). Most use many of the same protocols as are used by voice over IP. An interoperable standard for audio over IP using RTP has been published by the European Broadcasting Union (EBU).
Within a single building or music venue, audio over Ethernet is more likely to be used instead, avoiding audio data compression and, in some cases, IP encapsulation.
Technology
The European Broadcasting Union (EBU) together with many equipment manufacturers defined a common framework for audio contribution over IP in order to achieve interoperability between products. The framework defines RTP as a common protocol and media payload type formats according to IETF definitions. Session Initiation Protocol (SIP) is used for call setup and control. The recommendation is published as EBU Tech 3326–2007.
More advanced audio codecs are capable of sending audio over unmanaged IP networks like the internet using automated jitter buffering, forward error correction and error concealment to minimise latency and maximise packet streaming stability in live broadcast situations over unmanaged IP networks.
In the face of IPv4 address exhaustion, IPv6 capability ensures codecs are capable of connecting over new Internet infrastructure. IPv6 infrastructure is being widely deployed to deliver a virtually inexhaustible supply of IP addresses. IPv6 addressing makes it much easier for broadcast codecs to connect to each other directly and perform flexible multi-point connections over IP.
Codecs
In broadcasting, an IP audio codec is used to send broadcast-quality audio over IP from remote locations to radio and television studios around the globe. A codec that uses Internet Protocol (IP) may be used in remote broadcasts, as studio/transmitter links (STLs) or for studio-to-studio audio distribution. IP audio codecs use audio compression algorithms to send high fidelity audio over both wired broadband IP networks and wireless 3G, 3.5G, 4G and 5G cellular broadband networks.
Broadcasters are migrating to low-cost wired and wireless audio over IP instead of older and more costly fixed-line technologies such as ISDN, X.21 and POTS/PSTN. ISDN and POTS/PSTN leased lines are also being phased out in Europe and Australia, increasing the push into IP technologies for audio bro |
https://en.wikipedia.org/wiki/Prices%20of%20chemical%20elements | This is a list of prices of chemical elements. Listed here are mainly average market prices for bulk trade of commodities. Data on elements' abundance in Earth's crust is added for comparison.
, the most expensive non-synthetic element by both mass and volume is rhodium. It is followed by caesium, iridium and palladium by mass and iridium, gold and platinum by volume. Of those elements, rhodium, caesium and gold have only one stable isotope (, and respectively), iridium has two ( and ) whereas palladium and platinum both have several. Carbon in the form of diamond can be more expensive than rhodium. Per-kilogram prices of some synthetic radioisotopes range to trillions of dollars. While the difficulty of obtaining macroscopic samples of synthetic elements in part explains their high value, there has been interest in converting base metals to gold (Chrysopoeia) since ancient times, but only deeper understanding of nuclear physics has allowed the actual production of a tiny amount of gold from other elements for research purposes as demonstrated by Glenn Seaborg. However, both this and other routes of synthesis of precious metals via nuclear reactions is orders of magnitude removed from economic viability.
Chlorine, sulfur and carbon (as coal) are cheapest by mass. Hydrogen, nitrogen, oxygen and chlorine are cheapest by volume at atmospheric pressure.
When there is no public data on the element in its pure form, price of a compound is used, per mass of element contained. This implicitly puts the value of compounds' other constituents, and the cost of extraction of the element, at zero. For elements whose radiological properties are important, individual isotopes and isomers are listed. The price listing for radioisotopes is not exhaustive.
Chart
See also
2000s commodities boom
Notes
References
Properties of chemical elements
Chemical industry
Pricing
Commodity markets |
https://en.wikipedia.org/wiki/Renaissance%20Computing%20Institute | Renaissance Computing Institute (RENCI) was launched in 2004 as a collaboration involving the State of North Carolina, University of North Carolina at Chapel Hill (UNC-CH), Duke University, and North Carolina State University. RENCI is organizationally structured as a research institute within UNC-CH, and its main campus is located in Chapel Hill, NC, a few miles from the UNC-CH campus. RENCI has engagement centers at UNC-CH, Duke University (Durham), and North Carolina State University (Raleigh).
RENCI's founding director was Daniel A. Reed; Stanley C. Ahalt is the current director. RENCI employs over 80 staff members.
Mission statement
RENCI's current mission is: "to develop and deploy advanced technologies to enable research discoveries and practical innovations." RENCI achieves its mission by partnering with academic researchers, governmental policy makers, and industry leaders to engage in research and development aimed at solving critical challenges in several focus areas: data science and cyberinfrastructure; environmental sciences; and biomedical and health sciences.
History
RENCI was founded in January 2004 by Daniel A. Reed, PhD, with funding from the State of North Carolina, UNC-CH, North Carolina State University, and Duke University. Dr. Reed formerly served as director of the National Center for Supercomputing Applications (NCSA), Chief Architect for the National Science Foundation (NSF) TeraGrid initiative, and Member of the President's Information Technology Advisory Committee. In May 2004, Alan Blatecky joined RENCI as deputy director. Mr. Blatecky formerly served as executive director of the San Diego Supercomputer Center and head of the NSF Middleware initiative.
RENCI's initial mission statement was: to serve as a multidisciplinary institute bridging academe, commerce and society to enrich and empower human potential, create multi-institutional partnerships, and develop and deploy world-leading computational infrastructure.
In December 2005, RENCI received $5.9M in funding from the State of North Carolina for FY2005-2006 and $11.8M in recurring funds for "staff support, computer operations and equipment." This funding was critical for RENCI as it developed a statewide infrastructure to create a virtual organization and leverage that infrastructure and the expertise of RENCI staff in order to engage in federally funded projects of interest to the State. RENCI's initial focus was on applying cyber technologies and advanced analytics to coastal disaster planning, mitigation, and response. RENCI has since engaged in diverse partnerships throughout North Carolina and across the nation. Those partnerships have yielded numerous federal grant awards, thus providing the organization with an additional revenue stream.
RENCI underwent a change in leadership in 2007, with the departure of Dr. Reed and the appointment of Mr. Blatecky as interim director. RENCI implemented its first ever strategic planning process during this time. Th |
https://en.wikipedia.org/wiki/Argentine%20North%20Western%20Railway | The Argentine North Western Railway (ANW) (in Spanish: Ferrocarril Noroeste Argentino) was a British-owned railway company, founded in 1886, that operated a railway network in the Tucumán Province of Argentina. The company was sold to the British-owned Córdoba Central Railway (CC) in 1899.
History
The company was founded in 1886 to acquire a concession, granted to Samuel Kelton in 1885 by the provincial government of Tucumán, for the construction of a 142-km line from Tucumán south to La Madrid, and for the building of 35 km of branch lines, including one from Concepción to Medinas, in the sugar growing region of the province.
The line from Tucumán to La Madrid was completed in September 1889. It would be also known El Provincial due to it only run within Tucumán Province. Nevertheless, the financial situation of the company deteriorated until in 1899 (ten years after of being inaugurated) the ANWR was sold to the Córdoba Central Railway.
See also
Córdoba Central Railway
General Belgrano Railway
References
Bibliography
N
N
1889 establishments in Argentina
Railway companies established in 1889
Railway companies disestablished in 1899
n |
https://en.wikipedia.org/wiki/SocketCAN | SocketCAN is a set of open source CAN drivers and a networking stack contributed by Volkswagen Research to the Linux kernel. SocketCAN was formerly known as Low Level CAN Framework (LLCF).
Traditional CAN drivers for Linux are based on the model of character devices. Typically they only allow sending to and receiving from the CAN controller. Conventional implementations of this class of device driver only allow a single process to access the device, which means that all other processes are blocked in the meantime. In addition, these drivers typically all differ slightly in the interface presented to the application, stifling portability. The SocketCAN concept on the other hand uses the model of network devices, which allows multiple applications to access one CAN device simultaneously. Also, a single application is able to access multiple CAN networks in parallel.
The SocketCAN concept extends the Berkeley sockets API in Linux by introducing a new protocol family, PF_CAN, that coexists with other protocol families, such as PF_INET for the Internet Protocol. The communication with the CAN bus is therefore done analogously to the use of the Internet Protocol via sockets. Fundamental components of SocketCAN are the network device drivers for different CAN controllers and the implementation of the CAN protocol family. The protocol family, PF_CAN, provides the structures to enable different protocols on the bus: Raw sockets for direct CAN communication and transport protocols for point-to-point connections. Moreover the broadcast manager which is part of the CAN protocol family provides functions e.g. for sending CAN messages periodically or realize complex message filters. Since Linux kernel Version 5.10 the protocol family also includes an ISO-TP implementation, CAN_ISOTP.
Patches for CAN were added in the 2.6.25 Linux kernel. Meanwhile some controller drivers were added and work is going on to add drivers for a variety of controllers.
Usage
The application first sets up its access to the CAN interface by initialising a socket (much like in TCP/IP communications), then binding that socket to an interface (or all interfaces, if the application so desires). Once bound, the socket can then be used like a UDP socket via read, write, etc...
Python added support for SocketCAN in version 3.3. An open source library python-can provides SocketCAN support for Python 2 and Python 3.
Installing a CAN device requires loading the can_dev module and configuring the IP link to specify the CAN bus bitrate, for example:
$ modprobe can_dev
$ modprobe can
$ modprobe can_raw
$ sudo ip link set can0 type can bitrate 500000
$ sudo ip link set up can0
There is also a virtual CAN driver for testing purposes which can be loaded and created in Linux with the commands below.
$ modprobe can
$ modprobe can_raw
$ modprobe vcan
$ sudo ip link add dev vcan0 type vcan
$ sudo ip link set up vcan0
$ ip link show vcan0
3: vcan0: <NOARP,UP,LOWER_UP> mtu 16 qdisc noqueue stat |
https://en.wikipedia.org/wiki/C%C3%B3rdoba%20and%20Rosario%20Railway | The Córdoba & Rosario Railway (C&R) (in Spanish: Ferrocarril Córdoba y Rosario) was a British-owned railway company, founded in 1889, that operated a railway network in Santa Fe Province, Argentina. The company was sold to the Córdoba Central Railway (CC) in 1912.
The C&R was founded in 1889 to acquire a concession, granted to William Temple in 1886 by the province of Santa Fe, for the construction of a line, 222 km long, from the river port of Rosario to San Francisco which would provide a link with the CC which had completed the building of a line from Córdoba to San Francisco the previous year.
The section from San Francisco to Rafaela, later to be known as the "Rafaela Steam Tramway", was finished in 1890 and a year later the Rosario to Frontera line was completed. It was now possible to operate through trains from Rosario north to Tucumán via San Francisco and Córdoba in conjunction with the Córdoba Central. Once the CC had completed the construction of a line from Buenos Aires to Rosario in 1912 through trains could reach Tucumán from the capital for the first time.
Close collaboration between the two companies led finally to the purchase of the Córdoba & Rosario by the CC in 1913.
Finally the Córdoba Central would be added to Ferrocarril Belgrano network after all the Argentine railways were nationalised in 1948.
Bibliography
British Railways in Argentina 1857-1914: A Case Study of Foreign Investment by Colin M. Lewis, Athlone Press (for the Institute of Latin American Studies, University of London) (1983)
British Railways in Argentina 1860-1948 by H.R. Stones - P.E. Waters & Associates, Bromley, Kent - England (1993)
Defunct railway companies of Argentina
Metre gauge railways in Argentina
Rail transport in Santa Fe Province
Rail transport in Córdoba Province, Argentina |
https://en.wikipedia.org/wiki/Pinoy%20Idol | Idol () is a 2008 Philippine television interactive reality-based singing competition show broadcast by GMA Network. Created and developed by FremantleMedia and 19 Entertainment, the program is a franchise of Pop Idol created by British entertainment executive Simon Fuller, the show is the second incarnation of Philippine Idol.
Hosted by Raymond Gutierrez, with Ogie Alcasid (singer, songwriter, and record producer), Jolina Magdangal (singer and actress), and Wyngard Tracy (retired talent manager) as judges, it premiered on April 4, 2008, replacing Kakasa Ka Ba Sa Grade 5?. The show concluded on August 17, 2008, with a total of 37 episodes.
Transition from Philippine Idol
ABC 5 had previously announced that they are considering producing a second season of the show. However, many reports claim that ABC management was slowly abandoning that plan. Sources claimed that ABC incurred heavy losses in the previous season, primarily because of the low number of advertisement slots despite being a widely followed show. ABC asserted that it was still under negotiation with FremantleMedia about the second season and had earmarked Asian Idol as its "big launch", although there was a possibility that GMA was negotiating about Idol as well since the network already had local versions of Celebrity Duets and Are You Smarter Than A 5th Grader?—both FremantleMedia franchises.
After several negotiations, FremantleMedia had officially decided to move and to have the second season aired on GMA Network, which premiered on April 5, 2008. FremantleMedia's representative Geraldine Bravo said that it is "very fortunate" to find a new partner, while GMA Network's Senior Vice President for Entertainment Wilma Galvante added that both parties have agreed that the network "has the experience, the resources, and the people to mount talent-search programs".
Overview
Auditions
Auditions for Pinoy Idol were held in the following cities: Cagayan de Oro, Batangas City, Iloilo City, Cebu City, Davao City, Pasay, Dagupan, and Angeles City. Auditions in Naga were canceled for unknown reasons. During the Pasay auditions, Ida Henares, head of the GMA Artist Center (the talent arm of GMA Network), took over Magdangal's seat in the judges' panel as the latter was in the United States at the time. Out of thousands of aspirants, 179 passed through the next round of eliminations.
Theater rounds
The 179 audition passers gathered in Manila for the theater rounds in Cinema 6 of SM City North EDSA. The first round saw the hopefuls divided into groups of 10 and they each performed their pieces in front of the judges. Ninety contestants were chosen for the second round. In the second round, the ninety aspirants formed pairs and each pair had duets to perform together; they were judged separately. Half of the ninety were virtually cut. The final forty-five each performed a song of their choice for a final time in front of the judges. Afterwards, they were divided into three groups of fifteen. |
https://en.wikipedia.org/wiki/System%20Architecture%20Evolution | System Architecture Evolution (SAE) is the core network architecture of mobile communications protocol group 3GPP's LTE wireless communication standard.
SAE is the evolution of the GPRS Core Network, but with a simplified architecture; an all-IP Network (AIPN); support for higher throughput and lower latency radio access networks (RANs); and support for, and mobility between, multiple heterogeneous access networks, including E-UTRA (LTE and LTE Advanced air interface), and 3GPP legacy systems (for example GERAN or UTRAN, air interfaces of GPRS and UMTS respectively), but also non-3GPP systems (for example Wi-Fi, WiMAX or CDMA2000).
SAE Architecture
The SAE has a flat, all-IP architecture with separation of control plane and user plane traffic.
The main component of the SAE architecture is the Evolved Packet Core (EPC), also known as SAE Core. The EPC will serve as the equivalent of GPRS networks (via the Mobility Management Entity, Serving Gateway and PDN Gateway subcomponents).
Evolved Packet Core (EPC)
The subcomponents of the EPC are:
MME (Mobility Management Entity)
The MME is the key control-node for the LTE access-network. It is responsible for idle mode User Equipment (UE) paging and tagging procedure including retransmissions. It is involved in the bearer activation/deactivation process and is also responsible for choosing the Serving Gateway for a UE at the initial attach and at time of intra-LTE handover involving Core Network (CN) node relocation. It is responsible for authenticating the user (by interacting with the Home Subscriber Server). The Non Access Stratum (NAS) signaling terminates at the MME and it is also responsible for generation and allocation of temporary identities to UEs. It checks the authorization of the UE to camp on the service provider's Public Land Mobile Network (PLMN) and enforces UE roaming restrictions. The MME is the termination point in the network for ciphering/integrity protection for NAS signaling and handles the security key management. Lawful interception of signaling is also supported by the MME. The MME also provides the control plane function for mobility between LTE and 2G/3G access networks with the S3 interface terminating at the MME from the SGSN. The MME also terminates the S6a interface towards the HSS for roaming UEs.
SGW (Serving Gateway)
The Serving Gateway routes and forwards user data packets, while also acting as the mobility anchor for the user plane during inter-eNodeB handovers and as the anchor for mobility between LTE and other 3GPP technologies (terminating S4 interface and relaying the traffic between 2G/3G systems and Packet Data Network Gateway). For idle state User Equipment, the Serving Gateway terminates the downlink data path and triggers paging when downlink data arrives for the User Equipment. It manages and stores UE contexts, e.g. parameters of the IP bearer service, network internal routing information. It also performs replication of the user traffic in case |
https://en.wikipedia.org/wiki/Personal%20supercomputer | A personal supercomputer (PSC) is a marketing ploy used by computer manufacturers for high-performance computer systems and was a popular term in the mid 2000s to early 2010s. There is no exact definition for what a personal supercomputer is. Many systems have had that label put on them like the Cray CX1 and the Apple Power Mac G4. Generally, though the label is used on computers that are High end Workstations and Servers and have multiple processors and is small enough to fit on a desk or to the side. Other terms like PSC are Desktop/deskside supercomputers and supercomputers in a box.
Deskside clusters
This is the closest thing to a formal definition of a personal supercomputer as most Computers marketed as personal supercomputers are Deskside clusters like the Cray CX1. A Deskside cluster is as defined by insideHPC.com “Deskside clusters come in a chassis that you can plug into the wall of your office, and they are designed to sit on the floor next to your desk. The chassis can hold a relatively small number of computers that are on blades, trays, or in enclosures that slide into the chassis and bundle everything together.” The Blade or node are equipped with CPU/s and RAM also it may be equipped with GPU/s so that it may be used for CAD or for computation and the blade may have bays for hard drives built in.
Applications
They can be used in medical applications for processing brain and body scans, resulting in faster diagnosis. Another application is persistent aerial surveillance where large amounts of video data need to be processed and stored. Also they are used in AI for deep learning and machine learning. One more use is in the field of data analysis which requires large amounts of computational power.
Computers marketed as personal supercomputers
Deskside clusters
TyanPSC
Cray CX1
SGI Octane III
High End Workstations
Nvidia Tesla Personal Supercomputer
Nvidia DGX Station
Other computers
Intel iPSC
References
External links
Nvidia.com
insideHPC.com
Classes of computers
Personal computers |
https://en.wikipedia.org/wiki/Bill%20Brown%20%28news%20anchor%29 | Bill Brown is a former morning news anchor for WJAC-TV, the NBC network affiliated television station serving the Johnstown-Altoona-State College, Pennsylvania metropolitan area.
Brown began as a journalist for the Latrobe Bulletin and the Greensburg Tribune-Review. He joined WJAC in 1982 as a weekend reporter and weatherman. He became the anchor for the NewsCenter 6 at Noon weekday broadcast in 1984. In 1985, he became the anchorman for the station's new Sunrise news broadcast. He holds both of these positions today.
In 2002, he came under controversy when he said profanities on the air. On a live promo before the noon news, Brown did not realize he was on the air. When he realized he was, he uttered, "Oh shit!" The video cut to black, but his audio was left on, and he was heard saying, "I'm tired of this fucking shit!" Brown apologized for his choice of words and took a self-imposed leave of absence from the station. The Federal Communications Commission (FCC) chose not to suspend him further for his actions.
On February 2, 2015, Brown announced that he would be retiring at the end of the month. He retired on February 25, concluding his 32-year career.
External links
Bill Brown's WJAC bio
Bill Brown "Through The Years"
American television news anchors
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Systempunkt | A systempunkt ("system point") is a type of critical, vulnerable point in a system. The system may be a physical system (such as computer network) but the term is usually used when referring to a market (e. g., the French steel market, international flax market, etc.)
A systempunkt is a point in such a system vulnerable to disruption by many small interactions, such that a swarm of disruptions and attacks will cascade through the system and collapse it, possibly resulting in financial loss, supply shortages, or destabilization.
Examples
A systempunkt may be vulnerable to operational failure, but it is not vulnerable because of its own operation or location. Rather, its operation interacts through communication, exchange or movement of objects and these disrupted dependencies of flows – of data or goods – will be the failure when it is no longer operating. The effects on the network are more significant than those on the specific object.
Computer servers that fail from a Denial of service attack may no longer support the application or user base that depends on them; this is an example of an attack on a systempunkt.
A Systempunkt attack can be related to simple sabotage. But has a more grandiose objective: collapse of a dependent network or state social order.
A theoretical example might be if coal miners of a country went out on strike. This could cause a coal shortage which, cascading through the economy, could force a partial collapse, ultimately forcing desired major social changes.
Etymology
The term was coined by John Robb.
The etymology is modern and is a portmanteau word derived from the German term 'schwerpunkt' and the English language word 'system'. The German term from Blitzkrieg warfare's schwerpunkt literally means 'heavy point' and is often translated as centre of gravity or focal point. It is used here in relation to its military context of use, in which it describes the focal point of an attack against an enemy line, usually at some vulnerable part of that line, which will lead to the collapse in the enemy line of defense. But whereas a schwerpunkt focuses on a single object of attack, the Systempunkt is representative of network effects. A link may fail, not necessarily the weakest, but the effects on the network may continue to cascade, as an avalanche effect that spreads throughout the system. Repercussions may be continuous, and exhibit repeating failures that have aftershocks for the whole network.
Descriptively, systempunkt has some similarities to Heinz Guderian's adage "Nicht kleckern, klotzen!" ("Don't fiddle, smash!") though it reverses the intent and effect and intends to actualize cascading events through domino type dependencies. In practice, "Fiddle [with the systempunkt] until it [the system] smashes".
Criticism
The concept has been criticized.
References
External links
A US Phone Systempunkt, another theoretical systempunkt attack scenario
Hacking (computer security)
Economic warfare
Strategy |
https://en.wikipedia.org/wiki/Video%20Share | Video Share is an IP Multimedia System (IMS) enabled service for mobile networks that allows users engaged in a circuit switch voice call to add a unidirectional video streaming session over the packet network during the voice call. Any of the parties on the voice call can initiate a video streaming session. There can be multiple video streaming sessions during a voice call, and each of these streaming sessions can be initiated by any of the parties on the voice call. The video source can either be the camera on the phone or a pre-recorded video clip.
Video share is initiated from within a voice call. After a voice call is established, either party (calling or called) can start a Video Share (VS) session. The sending User is then able to stream one-way live or recorded video. The default behavior is that the receiving handset will automatically go to speakerphone mode when video is received, unless the headset is in place. The sender will be able to see what is being streamed on their handset, along with the receiving User. In this scenario, the sender can “narrate” over the CS audio connection while both parties view the video. Both users will have the ability initiate a video share session, and either the sender or recipient in a video share session can terminate the session at any time. As part of the VS invitation, the recipient can choose to reject the streamed video. It is intended that both sender and receiver will receive feedback when the other party terminates a session or the link drops due to lack of coverage.
The Video Share service is defined by the GSM Association (GSMA). It is often referred to as a Combinational Service, meaning that the service combines a circuit switch voice call with a packet switch multimedia session. This concept is described in the 3rd Generation Partnership Project (3GPP) specification documents 3GPP TS 22.279, 3GPP TS 23.279 and 3GPP TS 24.279. The Video Share service requires a 3GPP compliant IMS core system.
GSM Association has split the Video Share service definition into 2 distinct phases. The first phase (also called Phase 1) involves sharing a simple peer-to-peer, one-way video stream in conjunction with, but not synchronized to a circuit switch voice call. The second phase (also called Phase 2) introduces the Video Share Application Server in the solution and supports more complex features and capabilities, such as point-to-multipoint video share calls, video streaming to a web portal, and integration of video share with instant messaging.
In the industry, Video Share is also referred to by other names such as See What I See and Rich Voice Call.
Video Share is supported only in UMTS and EDGE (with DTM) networks. It is not supported in a GPRS or a CDMA network. The Video Share Client will drop a VS session when the handset transitions from UMTS to GSM during the session. The CS voice call will remain connected.
AT&T (formerly Cingular) is one of mobile operators who have deployed the Video |
https://en.wikipedia.org/wiki/Eizan%20Electric%20Railway | is a Japanese private railway company whose two lines run entirely in Sakyō-ku in the city of Kyoto, Kyoto Prefecture.
The name of this small railway network is abbreviated as , and is derived from the name of its predecessor, the of the Keifuku Electric Railroad. The present company was founded in 1985 as a subsidiary of Keifuku. The purpose of reorganization was to reduce the huge deficit of the Eiden lines, which had been completely isolated from the main Keifuku network since the abandonment of the Kyoto City Tramways in 1978. The split-off was considered to be an urgent matter, awaiting the completion of a rail connection between the two networks of Eiden and Keihan. The Keihan Electric Railway was at that time constructing the Ōtō Line to the Eiden terminal at Demachiyanagi. The opening of the Ōtō Line significantly reduced the deficit of Eiden. Later on, in 2002, all shares of Keifuku were transferred from Keifuku to Keihan, of which Eiden became a wholly owned subsidiary. This railway accepts the Surutto Kansai card for payment, but not the PiTaPa card.
The line is featured in the Japanese Rail Sim 3D: Journey to Kyoto train simulation game for the Nintendo 3DS and Nintendo Switch.
Lines
Eizan Main Line
Demachiyanagi — Yase-Hieizanguchi: 5.6 km
Kurama Line
Takaragaike — Kurama: 8.8 km
Rolling stock
For service
"Deo 700" series "Deo 710" type, "Deo 720" type, "Deo 730" type 1-car
"Deo 800" series 2-car
"Deo 900" series 2-car named "Kirara"
"Deo 600" type 2-car
For maintenance
"Deto 1000" type
See also
List of railway companies in Japan
References
External links
Official website
Official website
Railway companies of Japan
Rail transport in Kyoto Prefecture
Railway companies established in 1985
600 V DC railway electrification
Companies based in Kyoto
1985 establishments in Japan |
https://en.wikipedia.org/wiki/The%20World%20Around%20Us | The World Around Us was an Australian documentary television series that aired on the Seven Network between 1979 until 2006. It regularly showed documentaries which featured the likes of Malcolm Douglas and Sir David Attenborough.
Presenters
The regular hosts included John Riddell, Ernie Dingo, Ann Sanders, Scott Lambert, Lisa McCune, Frank Warrick, Kay McGrath.
Seven Network original programming
1970s Australian documentary television series
1980s Australian documentary television series
1990s Australian documentary television series
2000s Australian documentary television series
1979 Australian television series debuts
2006 Australian television series endings |
https://en.wikipedia.org/wiki/Food%204%20Life | Food 4 Life was an Australian television series on the Seven Network hosted by Cindy Sargon.
References
See also
List of Australian television series
Australian cooking television series
Seven Network original programming |
https://en.wikipedia.org/wiki/The%20Music%20Jungle | The Music Jungle was an Australian music television show that was broadcast on the Nine Network on Saturday mornings between 11am and 12pm.
The 2007 season began on 31 March and ended on 8 December. The 2008 season began on 22 March. The Music Jungle last aired in March 2009.
Program format
The Music Jungle generally played Top 40 Australian and overseas music clips.
The show was produced by Headlock Media, the Television and Content Creation Division of Sony Music Australia.
Presenters
The initial host was Asha Kuerten in 2007. In 2008, Angela Johnson of The Mint replaced Asha Kuerten as host. On 14 June 2008, former host of Eclipse Music TV and Famous Uncensored Lizzy Lovette replaced Angela Johnson.
See also
List of Australian music television shows
Nine Network original programming
Australian music television series
2007 Australian television series debuts
2009 Australian television series endings |
https://en.wikipedia.org/wiki/Database-centric%20architecture | Database-centric Architecture or data-centric architecture has several distinct meanings, generally relating to software architectures in which databases play a crucial role. Often this description is meant to contrast the design to an alternative approach. For example, the characterization of an architecture as "database-centric" may mean any combination of the following:
using a standard, general-purpose relational database management system, as opposed to customized in-memory or file-based data structures and access methods. With the evolution of sophisticated DBMS software, much of which is either free or included with the operating system, application developers have become increasingly reliant on standard database tools, especially for the sake of rapid application development.
using dynamic, table-driven logic, as opposed to logic embodied in previously compiled programs. The use of table-driven logic, i.e. behavior that is heavily dictated by the contents of a database, allows programs to be simpler and more flexible. This capability is a central feature of dynamic programming languages. See also control tables for tables that are normally coded and embedded within programs as data structures (i.e. not compiled statements) but could equally be read in from a flat file, database or even retrieved from a spreadsheet.
using stored procedures that run on database servers, as opposed to greater reliance on logic running in middle-tier application servers in a multi-tier architecture. The extent to which business logic should be placed at the back-end versus another tier is a subject of ongoing debate. For example, Toon Koppelaars presents a detailed analysis of alternative Oracle-based architectures that vary in the placement of business logic, concluding that a database-centric approach has practical advantages from the standpoint of ease of development and maintainability.
using a shared database as the basis for communicating between parallel processes in distributed computing applications, as opposed to direct inter-process communication via message passing functions and message-oriented middleware. A potential benefit of database-centric architecture in distributed applications is that it simplifies the design by utilizing DBMS-provided transaction processing and indexing to achieve a high degree of reliability, performance, and capacity. For example, Base One describes a database-centric distributed computing architecture for grid and cluster computing, and explains how this design provides enhanced security, fault-tolerance, and scalability.
an overall enterprise architecture that favors shared data models over allowing each application to have its own, idiosyncratic data model.
Even an extreme database-centric architecture called RDBMS-only architecture has been proposed, in which the three classic layers of an application are kept within the RDBMS. This architecture heavily uses the DBPL (Database Programming Language) of the R |
https://en.wikipedia.org/wiki/Arts%20%26%20Communication%20Magnet%20Academy | Arts & Communication Magnet Academy (ACMA) is a publicly funded arts magnet school in Beaverton, Oregon, United States. It is a member of the International Network of Schools for the Advancement of Arts Education.
The school opened in 1992, in facilities which previously served as a Beaverton School District elementary school, C.E. Mason Elementary, opened in 1949. It was originally called the Arts & Communications High School. The school was rebuilt in 2020 and reopened the school year 2021-2022, following the passage of a bond measure in May 2014.
Academics
In 2008, 100% of the school's seniors received a high school diploma. Of 60 students, 60 graduated and none dropped out.
The school received a silver ranking from U.S. News & World Reports 2010 "America's Best High Schools" survey.
Theatre company
Taking a prominent role in the school since the construction and completion of a new Performing Arts Center in early 2010, ACMA's theatre company has been widely acclaimed as one of the best in the school district. Headed by teacher and director Shaun Hennessy (since 2015-2016), previously headed by actor/director Joel Morello, the company has produced plays and musicals such as Bullshot Crummond, The Apple Tree, Midsummer Night's Dream, Much Ado About Nothing, Spoon River Anthology, The Good Doctor, Dancing at Lughnasa, Alice in Wonderland, A Greater Tuna, Celebration, The Fantasticks, Little Shop of Horrors, an acclaimed production of Godspell, which was sponsored by The Oregonian, and original verbatim stage adaptations of The Great Gatsby and Great Expectations. Godspell was the first production that was involved with ACMA's Theatre Giving Program.
Plays are not always necessarily produced by the department head; different theatrical artists in the community are given opportunities to direct and cast the show as they please. In addition, the company produces an annual One Act Festival featuring student written and directed work starring middle school students with little to no experience in the program thus far, as an introduction to how the shows work. For the 2013-2014 season, guest directors directed Our Town in the fall and Oliver! in the spring. In winter 2014, an original staged production of Coraline written, directed and produced by ACMA students graced the mainstage. Besides other student written works, such as the ACMA Zone (one-acts based on the Twilight Zone) and ACMA Live (based on Saturday Night Live) the spring 2015 production was Pride and Prejudice, directed by David Sikking. The 2018 season included The Laramie Project, Much Ado About Nothing, Hamlet, Heathers, and Trouble in Paradise Junction.
Jazz orchestra
The award-winning ACMA jazz program consists of the beginning level Concert Band, the intermediate level Symphonic Band, and the advanced level Jazz Orchestra. The jazz program is currently under the direction of Conte Bennett. Previous program directors include Thara Memory and Robert Crowell. Current Directors ar |
https://en.wikipedia.org/wiki/Do3D | Do3D was one of the first virtual reality computer software released for Microsoft Windows, being the first consumer product released by Superscape in 1998.
The purpose of the program was the ability to create your own virtual worlds, having the feature to implement them onto webpages with special plug-ins, and walk around them. It used low-polygon, simple 3D graphics, with the possibility of adding your own textures and colors into pre-made objects, or into construction blocks for custom buildings.
Its dedicated website, Do3D.com, is now offline. The "robots.txt" file present on the website's server prevented the pages from being archived by the Wayback Machine.
External links
News on Do3D's launch
Windows multimedia software
1998 software
Virtual reality |
https://en.wikipedia.org/wiki/DB2%20SQL%20return%20codes | SQL Return Codes are used on a day-to-day basis for the diagnosis of programming failures as a result of SQL calls by IBM Db2 programs. An important feature of IBM Db2 programs is the error processing. The error diagnostic containing the SQL Return Code is held in the field SQLCODE within the Db2 SQLCA block.
SQLCODE is no longer part of the SQL-standard. The SQL-standard replaced SQLCODE by the more detailed SQLSTATE.
SQLCA
The SQL communications area (SQLCA) structure is used within the IBM Db2 program to return feedback to the application program.
SQLCODE
The SQLCODE field contains the SQL return code. The code can be zero (0), negative or positive:
0 means that the execution was successful.
Negative values indicate an unsuccessful execution with an error.An example is , which means that a timeout has occurred with a rollback.
Positive value mean a successful execution with a warning.An example is , which means that no matching rows were found or that the cursor has reached the end of the table.
Here is a more comprehensive list of the SQLCODEs for DB2. Note that this list is not exhaustive. Also note that some SQLCODEs may only occur in specific Db2 products; e.g., only on Db2 z/OS, only on Db2 LUW, or only on Db2 for IBM i.
References
Articles copied to Wikibooks in need of cleanup
IBM DB2 |
https://en.wikipedia.org/wiki/C%C3%B3rdoba%20North%20Western%20Railway | The Córdoba North Western Railway (CNW) (in Spanish: Ferrocarril Córdoba y Noroeste) was a British-owned railway company, founded in 1889, that operated a railway network in the Córdoba Province of Argentina. Financial problems forced the sale of the company to the Argentine government in 1909.
History
The company was founded in 1889 to take over a concession, originally granted to Otto Bemberg & Co. the previous year, for the construction of a metre gauge line, 152 km long, from the Córdoba to Cruz del Eje via La Calera and Cosquín following the River Primero. The section from Córdoba to La Calera was opened on 30 July 1891 and San Roque was reached later that year on 4 September. The Cosquín to Cruz del Eje section was opened on 10 August 1891 and the line was finally completed when the San Roque to Cosquín section was opened on 7 March 1892.
In 1895, the company owned 8 locomotives, 12 coaches, 4 brake vans, 87 goods wagons.
Following the CNW's financial problems the Córdoba Central Railway took over the working of the line from Córdoba to Cruz del Eje in 1901 and due to further operating losses the CNW was taken over by the Argentine government in 1909 and became part of the State network.
See also
Tren de las Sierras
Belgrano Railway
References
British Railways in Argentina 1857-1914: A Case Study of Foreign Investment by Colin M. Lewis - Athlone Press (for the Institute of Latin American Studies, University of London), 1983
British Railways in Argentina 1860-1948 by H.R. Stones - P.E. Waters & Associates, Bromley, Kent, England, 1993
Defunct railway companies of Argentina
Metre gauge railways in Argentina
n |
https://en.wikipedia.org/wiki/East%20Argentine%20Railway | The East Argentine Railway (EA) (in Spanish: Ferrocarril Este Argentino) was a British-owned railway company, founded in 1871, that operated a railway network in the Entre Ríos and Corrientes provinces of Argentina. Financial problems forced the sale of the company to another British-owned company, the Argentine North Eastern Railway (ANER) in 1907.
History
The company was founded in August 1871 to take over a concession, originally granted to P.Montravel in October 1864 for the construction of a line, 293 km long, from Concordia in the province of Entre Ríos to Mercedes in the province of Corrientes. Standard gauge was chosen because of its use in the neighboring country of Uruguay and other railways in that part of Argentina later followed this example.
Starting from Concordia, Federación was reached in 1874, Monte Caseros the next year and then Ceibo on the River Uruguay, which was later developed as a port. Financial problems ensued and further construction of the line was stopped.
In 1886 the Argentine government granted a new concession to John and Matthew Clark to complete the line from Monte Caseros to Mercedes and on to Corrientes. The Clark brothers later transferred their concession to the ANE for the construction to be completed and in 1907 the company bought the EAR.
See also
Argentine North Eastern Railway
Urquiza Railway
Bibliography
British Railways in Argentina 1857-1914: A Case Study of Foreign Investment by Colin M. Lewis - Athlone Press (for the Institute of Latin American Studies, University of London, 1983)
British Railways in Argentina 1860-1948 by H.R. Stones - P.E.Waters & Associates, Bromley, Kent (England, 1993)
Defunct railway companies of Argentina
Railway companies established in 1874
1874 establishments in Argentina
Metre gauge railways in Argentina
Transport in Entre Ríos Province |
https://en.wikipedia.org/wiki/A%20Taste%20of%20Strawbs | A Taste of Strawbs is a box-set album by Strawbs. Instead of being a "best of" album, the compilers (Dave Cousins and Dick Greener) have attempted to present alternative versions of some well-known songs plus some previously unreleased material. Included are some very old songs by The Strawberry Hill Boys, with Dave Cousins, Tony Hooper and Ron Chesterman, also are some very interesting songs by Sandy Denny and The Strawbs, and outtakes from different periods of the band's career.
Track listing
CD 1 – Eyes Wide Open
"The Grey Hawk" (traditional) Strawberry Hill Boys live recording
"The Cruel Wars (Higher Germanie)" (traditional) Dave Cousins unreleased recording
"You Don't Think About Me" Strawberry Hill Boys demo
"Not All The Flowers Grow" (Dave Cousins) Dave Cousins demo
"You Keep Going Your Way" (Cousins) Strawberry Hill Boys demo
"Sail Away to the Sea" (Cousins) Sandy Denny and the Strawbs
"Nothing Else Will Do" (Cousins) Sandy Denny and the Strawbs
"Oh How She Changed" (Cousins, Tony Hooper) 2005 re-mix
"Or Am I Dreaming" (Cousins) 2005 re-mix
"All The Little Ladies" (Cousins, Hooper) Alternative mix with spoken word intro and outro
"Ah Me, Ah My" (Hooper) Alternate mix
"The Man Who Called Himself Jesus" (Cousins) Alternative mix
"The Battle" (Cousins) Live
"It's Just Love" (Dave Lambert) Unreleased Fire recording
"Another Day" (Cousins) Live
"Forever" (Cousins, Hooper) Dragonfly outtake
"Where am I"/"I'll Show You Where to Sleep" (Cousins) 1970 live track
"Canondale" (Richard Hudson) 1971 live instrumental track
"RMW" (Rick Wakeman) 1971 live track
"Sheep" (Cousins) 1971 live version
CD 2 – Changing Places
"Tomorrow" (Cousins, Hooper, Hudson, John Ford, Blue Weaver) 1972 live version
"New World" (Cousins) 1972 live version
"Here It Comes" (Cousins) 1972 live version
"See How They Run" (Cousins, Lambert) Cousins and Lambert 1972 home demo
"Going Home" (Cousins) Alternative version with Dave Lambert singing
"The Actor" (Cousins) Alternative mix
"Part of the Union" (Hudson, Ford) The original version which was to be released by "The Brothers"
"The Winter and the Summer" (Lambert) Dave Lambert home demo
"Whichever Way the Wind Blows" (Cousins) Previously unreleased version with Dave Cousins on vocals
"Shine on Silver Sun" (Cousins) Extended version with Cousins, Lambert and members of Ten Years After
"Out in the Cold"/"Round and Round" (Cousins) Dave Cousins acoustic demos
"The Writing on the Wall" (Cousins) Dave Cousins acoustic demo of unreleased song
"The Four Queens"
"Ghosts Theme" (Cousins) church bells – field recording
"Lemon Pie" (Cousins) Dave Cousins acoustic demo
"Cherie Je T'aime" (Cousins) French version of "Grace Darling"
"So Shall Our Love Die" (Cousins) Dave Cousins acoustic demo
"Still Small Voice" (Cousins) Dave Cousins acoustic demo
"How I Need You Now" (Cousins) Live recording from The Old Grey Whistle Test with John Mealing
CD 3 – Inside Out
"The Merchant Adventurer" (Cousins) Dave Cousins demo of unreleased song
"Blue |
https://en.wikipedia.org/wiki/Valuation-based%20system | Valuation-based system (VBS) is a framework for knowledge representation and inference. Real-world problems are modeled in this framework by a network of interrelated entities, called variables. The relationships between variables (possibly uncertain or imprecise) are represented by the functions called valuations. The two basic operations for performing inference in a VBS are combination and marginalization. Combination corresponds to the aggregation of knowledge, while marginalization refers to the focusing (coarsening) of it. VBSs were introduced by Prakash P. Shenoy in 1989 as general frameworks for managing uncertainty in expert systems.
Applications
VBS are used for knowledge representation in expert systems and data fusion.
Bibliography
Shenoy, Prakash P. A valuation-based language for expert systems. Int. Journal of Approximate Reasoning, vol. 3, no. 2, pages 383–411, 1989.
Shenoy, Prakash P. Valuation based systems: A framework for managing uncertainty in expert systems. In L. A. Zadeh and J. Kacprzyk, editors, Fuzzy Logic and the Management of Uncertainty, chapter 4, pages 83–104. Wiley, New York, 1992.
Shenoy, Prakash P. and Shafer, G. Axioms for probability and belief-function propagation. In J. Pearl G. Shafer, editor, Readings in uncertain reasoning, pages 575–610. San Mateo, CA: Morgan Kaufmann, 1990.
External links
Application of VBS to a threat assessment problem
Logic |
https://en.wikipedia.org/wiki/Gauntlet%3A%20The%20Deeper%20Dungeons | Gauntlet: The Deeper Dungeons is an expansion pack for Gauntlet.
Gameplay
Gauntlet: The Deeper Dungeons is an expansion pack for the original computer ports of Gauntlet with 512 new levels. The player requires the original game to play the expansion. Available player characters are Merlin the wizard, Thor the warrior, Thyra the valkyrie, and Questor the elf.
The pack significantly increases the amount of enemies to fight. The blue flashing traps appear right from the beginning of the game; these traps remove the walls holding back the enemies. There are also more Deaths to be encountered.
Invisibility amulets and healing potions are more common than in the original game, as is poisoned cider. There is a limit on item inventory, so if players pick up too many potions they will not have enough room for the keys they need.
Development
It was released in 1987 by the British company U.S. Gold in the UK and Europe, and Mindscape in the United States for the Amstrad CPC, MSX, Atari ST, Commodore 64, and ZX Spectrum ports of Gauntlet. It was developed by Gremlin Graphics.
Many of its levels were entries in a competition throughout Europe in which ten winners were awarded prizes, a Gauntlet T-shirt and a copy of the program for their computers. The contest was announced in the instructions of many of the ported games. The levels are presented randomly and its artwork is the side panel artwork of the arcade cabinet with only the main characters shown. The enemies were removed from the image and replaced with a pink background.
Reception
Reviewers noted that the levels were much harder than those in the original game, although the consensus was that it was not quite as good as the first game or the newly released arcade sequel.
Paul Rixon for Page 6 said "The Deeper Dungeons are simply more of the same – quite a lot more in fact."
Tony Hetherington for Your Commodore said "If you enjoyed the original Gauntlet (if not, why not?) then you'll relish another 512 levels which could be training for things to come as Gauntlet II is now in most arcades."
Sara Biggs for Your Sinclair said "If you're hooked on Gauntlet, then you've probably already got your fiver put on one side for this. if you weren't convinced by the original, then you'll not be very interested, but I can't help it if you're soft in the head! Rollicking good fun – I love it!"
Sinclair User said "Deeper Dungeons extends Gauntlet'''s life, but only by cramming more of them same into the game. US Gold did right by sticking on a low price tag, you might even call this a budget release".ZX Computing said "The graphics and gameplay are just as quick and impressive as the original which won't disappoint Gauntlet addicts but for a sequel I would have liked the inclusion of some new monsters and magic artefacts to collect."Computer Gamer said "More of the same, no matter how devious, doesn't seem to be enough. At [the lower price] for another 512 levels no Gauntlet player is going to complain bu |
https://en.wikipedia.org/wiki/NESPOT | NESPOT is a commercial subscription-based public Wi-Fi network run by Korea Telecom. It is by far the biggest such network in South Korea, much like BT Openzone and T-Mobile in Europe and North America. Currently they have an infrastructure compatible with the 802.11g protocol
Access to NESPOT requires the use of a Windows Executable file Presumably due to the use of nonstandard encryption schemes popular in Korea. Besides using a Windows executable, there is also the option of registering a MAC address, allowing access for systems not running Microsoft Windows
References
KT Group
Wi-Fi providers |
https://en.wikipedia.org/wiki/List%20of%20networked%20storage%20hardware%20platforms | Related articles are SAN and NAS.
Storage Area Network hardware platforms |
https://en.wikipedia.org/wiki/Alstom%20Coradia%20Juniper | The Alstom Coradia Juniper series is a family of electric multiple unit trains built by Alstom Transport Birmingham for use on the railway network in Great Britain. The family is related to the Coradia 1000 series of diesel multiple units.
There are currently two types in service with various TOCs, with a total of 76 units in service (36 class 458s and 40 class 334s). All Class 460s are now converted to Class 458/5s for South Western Railway.
Variants
Class 334
The Class 334 is an EMU in service with ScotRail on the suburban network around Glasgow, mainly operating services from Edinburgh Waverley via Airdrie and Bathgate on the North Clyde Line and some services on the Argyle Line. Class 334 trains are powered using overhead wires. A total of 40 three car units are in use (numbered 001–040), of which 38 were delivered starting in 1999, although due to teething problems, they did not enter service until 2001. The technical issues resulted in 2 extra units being delivered as compensation.
Class 458
The Class 458 (also known as 4JOP) is operated by South Western Railway on services from London Waterloo to Reading, Weybridge, Windsor & Eton Riverside, and circular metro routes from Waterloo via Richmond and Hounslow. As with all electrically powered trains on the former Southern Region, the Class 458 units are powered using . Initially, a total of thirty 4-car units were built, with deliveries beginning in 1998, with the full complement in service by 2004. However, they suffered from leaky roofs and failing electronics and were therefore stored from 2004 to late 2005, being replaced by more Class 450 units on the routes they operated. For a brief period, they were subleased to Gatwick Express, but were never used on Gatwick Express Services.
In 2013, former operator South West Trains and Porterbrook began the process of creating a new, 36-strong fleet of 5-car trains by reforming and partially rebuilding the vehicles from the Class 458 and Class 460 fleets; by creating 30 units utilising the original Class 458/0 vehicles, with an extra ex-Class 460 vehicle per unit to create 5-car units, and an additional 6 new 5-car units created entirely from ex-Class 460 stock. The new units have been renumbered as the Class 458/5. They entered service in March 2014. Work included complete reconstruction of cabs and gangways, as well as changes to the passenger areas. The units are painted into the same livery as the Class 450 units (they previously were painted in the South West Trains Express livery carried by the Class 444, 158 and 159 units). This process was completed in 2016. The original 30 ex-Class 458/0 units are numbered 458501–458530, and are distinguishable from the ex-Class 460 stock (458531-458536) by noting the different ribbon-glazed windows on ex-Class 460 units, different door window sizes and the lack of a pantograph recess on ex-Class 460 units. This means that if future conversion to OHLE is required for this fleet, the process wi |
https://en.wikipedia.org/wiki/Radio%201%20%28Norway%29 | Radio 1 is a radio network in Norway. It broadcasts programmes on FM Oslo, Bergen and Trondheim and on DAB nationally. It is operated by Bauer Media AS. It targets a relatively young and trendy audience.
Radio stations in Norway |
https://en.wikipedia.org/wiki/MYD | MYD may refer to:
The IATA code for Malindi Airport
file extension, a MyISAM data file in MySQL
The New Zealand Ministry of Youth Development, now part of the Ministry of Social Development
The Manhattan Young Democrats
Muslim American Society, Youth Division
Myd (musician) (born 1987), French musician |
https://en.wikipedia.org/wiki/LanguageWare | LanguageWare is a natural language processing (NLP) technology developed by IBM, which allows applications to process natural language text. It comprises a set of Java libraries which provide a range of NLP functions: language identification, text segmentation/tokenization, normalization, entity and relationship extraction, and semantic analysis and disambiguation. The analysis engine uses Finite State Machine approach at multiple levels, which aids its performance characteristics, while maintaining a reasonably small footprint.
The behaviour of the system is driven by a set of configurable lexico-semantic resources which describe the characteristics and domain of the processed language. A default set of resources comes as part of LanguageWare and these describe the native language characteristics, such as morphology, and the basic vocabulary for the language. Supplemental resources have been created which capture additional vocabularies, terminologies, rules and grammars, which may be generic to the language or specific to one or more domains.
A set of Eclipse-based customization tooling, LanguageWare Resource Workbench, is available on IBM's alphaWorks site, and allows domain knowledge to be compiled into these resources and thereby incorporated into the analysis process.
LanguageWare can be deployed as a set of UIMA-compliant annotators, Eclipse plug-ins or Web Services.
See also
Data Discovery and Query Builder
Finite state machine
Formal language
IBM Omnifind
Linguistics
Semantic Web
Semantics
Service-oriented architecture
Web services
UIMA
References
External links
IBM LanguageWare Resource Workbench on alphaWorks
IBM LanguageWare Miner for Multidimensional Socio-Semantic Networks on alphaWorks
JumpStart Infocenter for IBM LanguageWare on IBM.com
UIMA Homepage at the Apache Software Foundation
UIMA Framework on SourceForge
IBM OmniFind Yahoo! Edition (FREE enterprise search engine)
Semantic Information Systems and Language Engineering Group
SemanticDesktop.org
Related Papers
Branimir K. Boguraev Annotation-Based Finite State Processing in a Large-Scale NLP Architecture, IBM Research Report, 2004
Alexander Troussov, Mikhail Sogrin, "IBM LanguageWare Ontological Network Miner"
Sheila Kinsella, Andreas Harth, Alexander Troussov, Mikhail Sogrin, John Judge, Conor Hayes, John G. Breslin, "Navigating and Annotating Semantically-Enabled Networks of People and Associated Objects"
Mikhail Kotelnikov, Alexander Polonsky, Malte Kiesel, Max Völkel, Heiko Haller, Mikhail Sogrin, Pär Lannerö, Brian Davis, "Interactive Semantic Wikis"
Sebastian Trüg, Jos van den Oever, Stéphane Laurière, "The Social Semantic Desktop: Nepomuk"
Séamus Lawless, Vincent Wade, "Dynamic Content Discovery, Harvesting and Delivery"
R. Mack, S. Mukherjea, A. Soffer, N. Uramoto, E. Brown, A. Coden, J. Cooper, A. Inokuchi, B. Iyer, Y. Mass, H. Matsuzawa, and L. V. Subramaniam, "Text analytics for life science using the Unstructured Information Management Architectu |
https://en.wikipedia.org/wiki/Execute%20Channel%20Program | In IBM mainframe operating systems, Execute Channel Program (EXCP) is a macro generating a system call, implemented as a Supervisor Call instruction, for low-level device access, where the programmer is responsible for providing a channel program—a list of device-specific commands (CCWs)—to be executed by I/O channels, control units and devices. EXCP for OS/360 and successors is more specifically described in the OS System Programmer's Guide.; EXCP for DOS/360 and successors is more specifically described in DOS Supervisor and I/O Macros.
This article mostly reflects OS/360 through z/OS; some details are different for TOS/360 and DOS/360 through z/VSE.
Specifying datasets
Using EXCP, legacy devices and legacy datasets may be operated on with relatively high performance. EXCP devices are OPENed (that is, are made available to the application) by specifying the Data Control Block (DCB) for OS and the DTFPH for DOS.
Specifying I/O operations
For OS/360 through z/OS, the program provides an Input/Output Block (IOB) to EXCP; if the program executes an EXCP to multiple IOBs, the system processes them in the order that they were requested. For DASD the IOB includes a seek address, IOBSEEK, in the format MBBCCHHR, where M is the extent, BB is the bin for a data cell, CCHH is the cylinder and head, and R is the record number.
Appendages
"An appendage is a programmer-written routine that provides additional
control over I/O operations during channel program execution." A comprehensive list of appendages (exits in the EXCP context) allows authorized programs to override or augment many of the system security and data integrity checks. Most of these appendages are supported for compatibility with earlier instances of the OS, but the functions of several have been modified or extended for MVS. The appendages are specified in the DCB as the last two characters of the module name IGG019xx, where xx = WA to Z9, inclusive. These module names are reserved for installation-written appendages. Any other name of the form IGG019xx is reserved for use by IBM access methods. Appendages must reside in SYS1.SVCLIB (SYS1.LPALIB in SVS or later instances of the OS).
Dataset integrity
Normally, when a program OPENs a DCB for EXCP, OPEN creates a Data Extent Block (DEB) containing each extent for the first volume of the associated dataset; however, for parallel mount OPEN creates a DEB containing all extents for all volumes. Each DEB is forward- and backward-chained to the DCB, and EXCP checks the chaining as a system security measure, as the DCB resides in unprotected user storage whereas the DEB resides in protected system storage, Subpool 253; in OS/VS1 and OS/VS2 EXCP uses DEBCHK to ensure that the DEB was created by OPEN. For DASD, EXCP checks that the seek address in the IOB is within one of the extents, and uses a Set File Mask to, e.g. indicate whether the extent is cylinder or track oriented, whether write is permitted; this prevents a seek out of the specified t |
https://en.wikipedia.org/wiki/Alexey%20Ivakhnenko | Alexey Grigoryevich Ivakhnenko (; 30 March 1913 – 16 October 2007) was a Soviet and Ukrainian mathematician most famous for developing the group method of data handling (GMDH), a method of inductive statistical learning, for which he is sometimes referred to as the "Father of deep learning".
Early life and education
Aleksey was born in Kobelyaky, Poltava Governorate in a family of teachers. In 1932 he graduated from Electrotechnical college in Kiev and worked for two years as an engineer on the construction of large power plant in Berezniki. Then in 1938, after graduation from the Leningrad Electrotechnical Institute, Ivakhnenko worked in the All-Union Electrotechnical Institute in Moscow during wartime. There he investigated the problems of automatic control in the laboratory, led by Sergey Lebedev.
He continued research in other institutions in Ukraine after return to Kiev in 1944. In that year he received the Ph.D. degree and later, in 1954 had received D.Sc. degree. In 1964, he was appointed as a Head of the Department of Combined Control Systems at the Institute of Cybernetics. Simultaneously working at first as a Lecturer, and from 1961, as a Professor of Automatic Control and Technical Cybernetics at the Kiev Polytechnic Institute.
Research
Ivakhnenko is known to be the founder of Inductive modelling, a scientific approach used for pattern recognition and complex systems forecasting. He had used this approach during development of the group method of data handling (GMDH). In 1968 the journal "Avtomatika" had published his article "Group Method of Data Handling – a rival of the method of stochastic approximation", marking the beginning of a new stage in his scientific work. He led the development of this approach, with a professional team of mathematicians and engineers at the Institute of Cybernetics.
Group method of data handling
The GMDH method presents a unique approach to the artificial intelligence problems solution and even a new philosophy to scientific research, which became possible using modern computers. A researcher may not adhere
precisely to traditional deductive way of building models "from general theory – to a particular model": monitoring an object, studying its structure, understanding the principles of its operation, developing theory and testing the model of an object. Instead, the new approach is proposed "from specified data – to a general model": after the input of data, a researcher selects a class of models, the type of models-variants generation and sets the criterion for model selection. As most routine work is transferred to a computer, the impact of human influence on the objective result is minimised. In fact, this approach can be considered as one of the implementations of the artificial intelligence thesis, which states that a computer can act as powerful advisor to humans.
The development of GMDH consists of a synthesis of ideas from different areas of science: the cybernetic concept of "black |
https://en.wikipedia.org/wiki/Group%20method%20of%20data%20handling | Group method of data handling (GMDH) is a family of inductive algorithms for computer-based mathematical modeling of multi-parametric datasets that features fully automatic structural and parametric optimization of models.
GMDH is used in such fields as data mining, knowledge discovery, prediction, complex systems modeling, optimization and pattern recognition. GMDH algorithms are characterized by inductive procedure that performs sorting-out of gradually complicated polynomial models and selecting the best solution by means of the external criterion.
A GMDH model with multiple inputs and one output is a subset of components of the base function (1):
where fi are elementary functions dependent on different sets of inputs, ai are coefficients and m is the number of the base function components.
In order to find the best solution, GMDH algorithms consider various component subsets of the base function (1) called partial models. Coefficients of these models are estimated by the least squares method. GMDH algorithms gradually increase the number of partial model components and find a model structure with optimal complexity indicated by the minimum value of an external criterion. This process is called self-organization of models.
As the first base function used in GMDH, was the gradually complicated Kolmogorov–Gabor polynomial (2):
Usually more simple partial models with up to second degree functions are used.
The inductive algorithms are also known as polynomial neural networks. Jürgen Schmidhuber cites GMDH as one of the first deep learning methods, remarking that it was used to train eight-layer neural nets as early as 1971.
History
The method was originated in 1968 by Prof. Alexey G. Ivakhnenko in the Institute of Cybernetics in Kyiv.
This inductive approach from the very beginning was a computer-based method so, a set of computer programs and algorithms were the primary practical results achieved at the base of the new theoretical principles. Thanks to the author's policy of open code sharing the method was quickly settled in the large number of scientific laboratories worldwide. As most routine work is transferred to a computer, the impact of human influence on the objective result is minimised. In fact, this approach can be considered as one of the implementations of the Artificial Intelligence thesis, which states that a computer can act as powerful advisor to humans.
The development of GMDH consists of a synthesis of ideas from different areas of science: the cybernetic concept of "black box" and the principle of successive
genetic selection of pairwise features, Godel's incompleteness theorems and the Gabor's principle of "freedom of decisions choice", the Adhémar's incorrectness and the Beer's principle of external additions.
GMDH is the original method for solving problems for structural-parametric identification of models for experimental data under uncertainty. Such a problem occurs in the construction of a mathemati |
https://en.wikipedia.org/wiki/Mac%20OS%20Icelandic%20encoding | Mac OS Icelandic is an obsolete character encoding that was used in Apple Macintosh computers to represent Icelandic text. It is largely identical to Mac OS Roman, except for the Icelandic special characters Ý, Þ and Ð which have replaced typography characters.
IBM uses code page 1286 (CCSID 1286) for Mac OS Icelandic.
Layout
Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII.
Before Mac OS 8.5, the character 0xDB mapped to the currency sign (¤), Unicode character U+00A4.
The character 0xBB maps to fi, Unicode character U+FB01, in the TrueType Mac Icelandic fonts.
The character 0xBC maps to fl, Unicode character U+FB02, in the TrueType Mac Icelandic fonts.
The character 0xF0 is a solid Apple logo. Apple uses U+F8FF in the Corporate Private Use Area for this logo, but it is usually not supported on non-Apple platforms.
References
Character sets
Icelandic |
https://en.wikipedia.org/wiki/Penman%E2%80%93Monteith%20equation | The Penman–Monteith equation approximates net evapotranspiration (ET) from meteorological data, as a replacement for direct measurement of evapotranspiration. The equation is widely used, and was derived by the United Nations Food and Agriculture Organization for modeling potential evapotranspiration ET0.
Significance
Evapotranspiration contributions are very significant in a watershed's water balance, yet are often not emphasized in results because the precision of this component is often weak relative to more directly measured phenomena, e.g. rain and stream flow. In addition to weather uncertainties, the Penman–Monteith equation is sensitive to vegetation specific parameters, e.g. stomatal resistance or conductance.
Various forms of crop coefficients (Kc) account for differences between specific vegetation modeled and a reference evapotranspiration (RET or ET0) standard. Stress coefficients (Ks) account for reductions in ET due to environmental stress (e.g. soil saturation reduces root-zone O2, low soil moisture induces wilt, air pollution effects, and salinity). Models of native vegetation cannot assume crop management to avoid recurring stress.
Equation
Per Monteith's Evaporation and Environment, the equation is:
λv = Latent heat of vaporization. Energy required per unit mass of water vaporized. (J g−1)
Lv = Volumetric latent heat of vaporization. Energy required per water volume vaporized. (Lv = 2453 MJ m−3)
E = Mass water evapotranspiration rate (g s−1 m−2)
ET = Water volume evapotranspired (mm s−1)
Δ = Rate of change of saturation specific humidity with air temperature. (Pa K−1)
Rn = Net irradiance (W m−2), the external source of energy flux
G = Ground heat flux (W m−2), usually difficult to measure
cp = Specific heat capacity of air (J kg−1 K−1)
ρa = dry air density (kg m−3)
δe = vapor pressure deficit (Pa)
ga = Conductivity of air, atmospheric conductance (m s−1)
gs = Conductivity of stoma, surface or stomatal conductance (m s−1)
γ = Psychrometric constant (γ ≈ 66 Pa K−1)
Note: Often resistances are used rather than conductivities.
where rc refers to the resistance to flux from a vegetation canopy to the extent of some defined boundary layer.
The atmospheric conductance ga accounts for aerodynamic effects like the zero plane displacement height and the roughness length of the surface. The stomatal conductance gs accounts for effect of leaf density (Leaf Area Index), water stress and concentration in the air, that is to say to plant reaction to external factors. Different models exist to link the stomatal conductance to these vegetation characteristics, like the ones from P.G. Jarvis (1976) or Jacobs et al. (1996).
Accuracy
While the Penman-Monteith method is widely considered accurate for practical purposes and is recommended by the Food and Agriculture Organization of the United Nations, errors when compared to direct measurement or other techniques can range from -9 to 40%.
Variations and alternatives
FAO 56 Penman-Mo |
https://en.wikipedia.org/wiki/Adji | Adji may refer to:
Adji Bousso Dieng, Senegalese computer scientist and statistician
Boukary Adji (1939–2018), politician from Niger
Oware, an abstract strategy game, for which "Adji" is the Ewe language name
See also
Adjei, a similar name |
https://en.wikipedia.org/wiki/Acorn%20Computers%20%282006%29 | Acorn Computers Ltd was a British computer company based in Nottingham, England in the United Kingdom between 2006 and 2009. It licensed, in early 2006, the dormant Acorn Computers trademark from French company Aristide & Co Antiquaire De Marques. This company sold IBM PC compatible computers and had no connection to ARM, a spin-off from the original Acorn Computers.
Launch
In April 2006, internet news portals claimed that the Acorn company was to relaunch. The new company announced its range before the 2006 Computer Trade Show, held at the NEC near Birmingham, UK. At the show, the company distributed leaflets inviting people to "be part of one of the most exciting brand re-launches in UK history" by joining its reseller program.
Products
The company sold a range of laptop computers. The systems used Microsoft Windows rather than the RISC OS operating system developed by the original Acorn Computers and this incarnation of Acorn did not support or license any technologies or products of the original, apart from the name and trademark.
The reuse of the Acorn Computers Ltd name caused an amount of confusion and controversy, particularly amongst users of the original company's products.
Domain dispute
On 24 July 2006, Nominet's Dispute Resolution Service ruled that the domain name should be transferred to the new Acorn from computer enthusiast Roy Johnson. The company made a complaint to the service contending that the "use of Acorn Computers' company name is illegal and has caused much confusion and continues to do so which is detrimental to [Acorn] and extremely misleading". Despite the fact that Johnson appeared to have been operating the website since at least 2001, five years before the new Acorn was registered as a company, Nominet ruled in favour of Acorn, as Johnson had not maintained an accurate record of his postal address, and mail to Johnson's registered address was returned by Royal Mail marked 'addressee has gone away'.
Demise
Acorn Computers Ltd failed to file any accounts at Companies House, and so was struck off the limited companies register and dissolved in December 2009.
References
External links
(archive copy from 2008)
Manufacturing companies based in Nottingham
Defunct computer companies of the United Kingdom
Computer hardware companies
Re-established companies
Computer companies disestablished in 2009
Computer companies established in 2006
Defunct companies of England |
https://en.wikipedia.org/wiki/Robert%20Rodman | Robert Rodman (1940-2017) was a lifelong academic, serving on the faculty of the University of North Carolina and Duke University before becoming an associate professor of computer science at North Carolina State University in Raleigh, North Carolina. Rodman attended UCLA where he attained graduate degrees in mathematics linguisitcs. At UCLA, he met and later worked with linguist Victoria Fromkin and authored the bestselling linguistics textbook An Introduction to Language. He was also a novelist, his work published by Boson Books in Raleigh, North Carolina.
Dr. Rodman died in January 2017, from complications related to Inclusion Body Myositis.
Bibliography
External links
Robert Rodman page at NCSU
Robert Rodman obituary
2017 deaths
Linguists from the United States
1940 births
North Carolina State University faculty |
https://en.wikipedia.org/wiki/Convent%20of%20Jesus%20and%20Mary | The Convent of Jesus and Mary ("CJM") is a network of Roman Catholic schools founded by the Congregation of the Religious of Jesus and Mary. The school network originating in east-central France in the 19th century has since its inception expanded to several countries in Europe, Asia, Africa, North and South America.
Countries
There are schools in the Republic of Ireland, Spain, Italy, England, and Germany, the United States, Canada, Mexico, Colombia, and Bolivia, Lebanon, Syria, Cameroon, Equatorial Guinea, Gabon, India, Pakistan, and the Philippines.
History
Claudine Thévenet (1774–1837) (known as Mary of St. Ignatius) founded the religious institute of the Religious of Jesus and Mary, a Roman Catholic religious congregation of women dedicated to the education and service of the poor in Lyon, France, on 5 October 1818.
School Network
Some of the CJM schools include:
India:
Convent of Jesus and Mary, Ambala
Convent of Jesus and Mary, Delhi
Convent of Jesus and Mary, Mumbai (Fort Convent, Mumbai)
St. Anne’s High School, Fort, Mumbai
Convent of Jesus and Mary, Waverley, Mussoorie
Convent of Jesus and Mary, Ranaghat
Convent of Jesus and Mary, Shimla
Colleges :
Jesus and Mary College New Delhi
St. Bede's College, Shimla
Ireland:
Convent of Jesus and Mary, Gortnor Abbey, Co. Mayo
Pakistan:
Convent of Jesus and Mary, Sialkot (established: 1856)
Convent of Jesus and Mary, Murree (established: 1876)
Convent of Jesus and Mary, Lahore (established: 1876)
Convent of Jesus and Mary, Karachi (established: 1957)
United Kingdom:
Convent of Jesus and Mary, Thornton College, Thornton, Buckingham
Convent of Jesus and Mary Language College, London
References
Girls' schools in France
Catholic schools in India
Catholic schools in the United Kingdom
Roman Catholic schools in the Republic of Ireland
Catholic schools in Pakistan
Schools in Lebanon |
https://en.wikipedia.org/wiki/Membrane%20computing | Membrane computing (or MC) is an area within computer science that seeks to discover new computational models from the study of biological cells, particularly of the cellular membranes. It is a sub-task of creating a cellular model.
Membrane computing deals with distributed and parallel computing models, processing multisets of symbol objects in a localized manner. Thus, evolution rules allow for evolving objects to be encapsulated into compartments defined by membranes. The communications between compartments and with the environment play an essential role in the processes. The various types of membrane systems are known as P systems after Gheorghe Păun who first conceived the model in 1998.
An essential ingredient of a P system is its membrane structure, which can be a hierarchical arrangement of membranes, as in a cell, or a net of membranes (placed in the nodes of a graph), as in a tissue or a neural net. P systems are often depicted graphically with drawings.
The intuition behind the notion of a membrane is a three-dimensional vesicle from biology. However the concept itself is more general, and a membrane is seen as a separator of two regions. The membrane provides for selective communication between the two regions. As per Gheorghe Păun, the separation is of the Euclidean space into a finite “inside” and an infinite “outside”. The selective communication is where the computing comes in.
Graphical representations may have numerous elements, according to the variation of the model that is being studied. For example, a rule may produce the special symbol δ, in which case the membrane that contains it is dissolved and all its contents move up in the region hierarchy.
The variety of suggestions from biology and the range of possibilities to define the architecture and the functioning of a membrane-based multiset processing device are practically endless. Indeed, the membrane computing literature contains a very large number of models. Thus, MC is not merely a theory related to a specific model, it is a framework for devising compartmentalized models.
Chemicals are modeled by symbols, or alternatively by strings of symbols. The region, which is defined by a membrane, can contain other symbols or strings (collectively referred to as objects) or other membranes, so that a P system has exactly one outer membrane, called the skin membrane, and a hierarchical relationship governing all its membranes under the skin membrane.
If objects are symbols, then their multiplicity within a region matters; however multi-sets are also used in some string models. Regions have associated rules that define how objects are produced, consumed, passed to other regions and otherwise interact with one another. The nondeterministic maximally parallel application of rules throughout the system is a transition between system states, and a sequence of transitions is called a computation. Particular goals can be defined to signify a halting state, at which point |
https://en.wikipedia.org/wiki/Gheorghe%20P%C4%83un | Gheorghe Păun (; born December 6, 1950, in Cicănești, Argeș County) is a computer scientist from Romania, prominent for work on membrane computing and the P system.
Păun studied mathematics at the University of Bucharest, obtaining an MSc. in 1974 and a PhD in 1977 under the direction of Solomon Marcus. He has been a researcher at the Institute of Mathematics of the Romanian Academy since 1990. Păun was elected a member of the Academia Europaea in 2006, and a titular member of the Romanian Academy in 2012. He supervised the PhD thesis of 5 students. In 2016, he was awarded the title of Doctor Honoris Causa Scientiarum.
References
External links
Gheorghe Paun's webpage
Theoretical computer scientists
Romanian bioinformaticians
1950 births
Living people
Members of Academia Europaea
Titular members of the Romanian Academy
University of Bucharest alumni
People from Argeș County |
https://en.wikipedia.org/wiki/Miss%20America%202002 | Miss America 2002, the 75th Miss America pageant, was televised live from Boardwalk Hall in Atlantic City, New Jersey on Saturday, September 22, 2001, on the ABC Network. The pageant was won by Katie Harman of Oregon, the first woman representing that state to take the crown.
Prior to the competition, the delegates spent a weekend in Philadelphia, Pennsylvania where they participated in a parade and attended a reception and did some sightseeing. During their first week in Atlantic City, the September 11 attacks occurred, but despite the cancelling of the traditional pageant-eve parade, it was decided to hold the pageant as intended. The contestants themselves voted 2–1 to continue with the competition.
Results
Placements
Order of announcements
Top 20
Top 10
Top 5
Awards
Quality of Life award
Delegates
1 Age as of September 2001
Controversy
Following the pageant, the parents of Miss America 2002 wrote an eight-page letter to the pageant's organizers complaining about mistreatment and fraudulent billing.
Judges
Janet Langhart Cohen
John H. Dalton
Sanford L. Fox
Karl Jurman
Harvey Mackay
Lee Meriwether
Patricia Northrup
References
External links
Official Results
2002
2001 in the United States
2002 beauty pageants
2001 in New Jersey
September 2001 events in the United States
Events in Atlantic City, New Jersey
Impact of the September 11 attacks on television |
https://en.wikipedia.org/wiki/Miss%20America%201991 | Miss America 1991, the 64th Miss America pageant, was held at the Boardwalk Hall in Atlantic City, New Jersey on Saturday, September 8, 1990 on NBC Network.
Results
Placements
Order of announcements
Top 10
Awards
Preliminary awards
Non-finalist awards
Quality of Life awards
Fruit of the Loom Award
Delegates
Judges
Delta Burke
John Forsythe
Shirley Jones
Larry King
Sidney Sheldon
Cynthia Sikes
Nell Carter
References
External links
Miss America official website
1991
1990 in the United States
1991 beauty pageants
1990 in New Jersey
September 1990 events in the United States
Events in Atlantic City, New Jersey |
https://en.wikipedia.org/wiki/Miss%20America%201988 | Miss America 1988, the 61st Miss America pageant, was held at the Boardwalk Hall in Atlantic City, New Jersey on September 19, 1987, on NBC Network.
Pageant winner Kaye Lani Rae Rafko of Michigan became a registered nurse, and has done many years of volunteer work for medical charities and hospices. She co-hosts a public access television series called Only In Monroe for MPACT.
Among the contestants was Miss South Carolina, television personality Nancy O'Dell, entered as Nancy Humphries.
Results
Order of announcements
Top 10
Awards
Preliminary awards
Non-finalist awards
Judges
Frank Deford
Judith Ford
Jack Grossbart
Rupert Holmes
Anita Mann
Martina Arroyo
Melba Moore
Bill G. Young
Candidates
References
External links
Miss America official website
1988
1987 in the United States
1988 beauty pageants
1987 in New Jersey
September 1987 events in the United States
Events in Atlantic City, New Jersey |
https://en.wikipedia.org/wiki/Miss%20America%201995 | Miss America 1995, the 68th Miss America pageant, was held at the Boardwalk Hall in Atlantic City, New Jersey on Saturday, September 17, 1994 and was televised by the NBC Network.
Heather Whitestone, the winner representing Alabama, became the first deaf Miss America.
Results
Placements
Order of announcements
Top 10
Top 5
Awards
Preliminary awards
Quality of Life awards
Non-finalist awards
Other awards
Delegates
Judges
Dan Jansen
Buddy Morra
Susan Powell
Emma Samms
Cheryl Tiegs
Michael Feinstein
Susan L. Taylor
External links
Miss America official website
1995
1994 in the United States
1995 beauty pageants
1994 in New Jersey
September 1994 events in the United States
Events in Atlantic City, New Jersey |
https://en.wikipedia.org/wiki/W32/Storm.worm | The W32.Storm.Worm malware is a computer worm, released in 2001, that infects unpatched systems running the Microsoft IIS server and begins a denial-of-service attack on http://www.microsoft.com. It is a low-impact, low-infection worm that is removed by all major antivirus solutions since 2001. W32.Storm.Worm is unrelated to the much more dangerous Nuwar or Small.dam worm, commonly referred to as the Storm Worm, which is responsible for the extensive Storm botnet.
References
http://www.symantec.com/security_response/writeup.jsp?docid=2001-060615-1534-99
Computer worms
2005 in computing |
https://en.wikipedia.org/wiki/Douglas%20L.%20Jones | Douglas L. Jones is the William L. Everitt Distinguished Professor of Electrical and Computer Engineering at the University of Illinois Urbana-Champaign.
Biography
Jones received the BSEE, MSEE, and Ph.D. degrees from Rice University in 1983, 1986, and 1987, respectively. During the 1987–1988 academic year, he was at the University of Erlangen–Nuremberg in Germany on a Fulbright postdoctoral fellowship. Since 1988, he has been with the University of Illinois at Urbana-Champaign, where he is currently a Professor in Electrical and Computer Engineering, the Coordinated Science Laboratory, and the Beckman Institute for Advanced Science and Technology.
In Spring 1995 and 2002 Jones was on sabbatical leave at the University of Washington, and the University of California, Berkeley, respectively. In July through September 1998 he was a participant in the Programme on Nonlinear and Nonstationary Signal Processing at the Isaac Newton Institute for Mathematical Sciences at the University of Cambridge, England. In the Spring semester of 1999 he served as the Texas Instruments Visiting Professor at Rice University. In December 2005 he was an Academic Visitor at the University of Melbourne.
In 2002, Jones was elevated to Fellow of the IEEE for contributions to adaptive and statistical time-frequency analysis. Jones served as a Member-at-Large of the IEEE Signal Processing Society Board of Governors 2002-2005. He teaches courses in the general area of signal processing, and is an author of the laboratory textbooks A Digital Signal Processing Laboratory Using the TMS32010 and DSP Laboratory with TI TMS320C54x. In 2006, he received the UIUC ECE Ronald W. Pratt Award for Teaching Excellence. He is committed to the emerging open-source textbook movement and was the Connexions Author of the Year in 2003. His research interests are in digital signal processing and communications, including non-stationary signal analysis, adaptive filters and beamforming, OFDM and DMT optimization, biologically inspired signal processing, and various applications including low-power wireless communication, MEMS sensory systems, and advanced hearing aids.
References
Year of birth missing (living people)
Living people
University of Illinois Urbana-Champaign faculty
Fellow Members of the IEEE
Rice University alumni |
https://en.wikipedia.org/wiki/Physical%20design | Physical design can refer to
Physical database design - see also Physical data model
Physical design (electronics) |
https://en.wikipedia.org/wiki/International%20Symposium%20on%20Reliable%20Distributed%20Systems | The International Symposium on Reliable Distributed Systems (SRDS) is an academic conference covering distributed systems design and development, particularly with properties such as reliability, availability, safety, security and real time. The symposium is traditionally a single track event held over three days with a number of associated workshops staged a day before the symposium starts. SRDS is sponsored by the IEEE Computer Society Technical Committee on Distributed Processing.
SRDS was first organised in 1981; since then, the symposium has been organised in 1982, 1983, 1984, and annually from 1986.
See also
The list of distributed computing conferences contains other academic conferences in distributed computing.
The list of computer science conferences contains other academic conferences in computer science.
References
"Message from the Symposium Chair," SRDS 2006, .
SRDS proceedings information in DBLP.
SRDS 1981 in DBLP.
External links
SRDS web sites: 2009, 2008, 2007, 2006, 2005.
Distributed computing conferences |
https://en.wikipedia.org/wiki/Pubmeth | PubMeth is a database that contains information about DNA hypermethylation in cancer. It can be queried either by searching a list of genes, or cancer (sub)types.
It was created at the lab for bioinformatics and computational genomics in the Department of Molecular Biotechnology, Faculty of Bioscience Engineering at Ghent University, Belgium.
It was published in Nucleic Acids Research
References
External links
Official website
Medical databases |
https://en.wikipedia.org/wiki/Stochastic%20grammar | A stochastic grammar (statistical grammar) is a grammar framework with a probabilistic notion of grammaticality:
Stochastic context-free grammar
Statistical parsing
Data-oriented parsing
Hidden Markov model
Estimation theory
The grammar is realized as a language model. Allowed sentences are stored in a database together with the frequency how common a sentence is. Statistical natural language processing uses stochastic, probabilistic and statistical methods, especially to resolve difficulties that arise because longer sentences are highly ambiguous when processed with realistic grammars, yielding thousands or millions of possible analyses. Methods for disambiguation often involve the use of corpora and Markov models. "A probabilistic model consists of a non-probabilistic model plus some numerical quantities; it is not true that probabilistic models are inherently simpler or less structural than non-probabilistic models."
Examples
A probabilistic method for rhyme detection is implemented by Hirjee & Brown in their study in 2013 to find internal and imperfect rhyme pairs in rap lyrics. The concept is adapted from a sequence alignment technique using BLOSUM (BLOcks SUbstitution Matrix). They were able to detect rhymes undetectable by non-probabilistic models.
See also
Colorless green ideas sleep furiously
Computational linguistics
L-system#Stochastic grammars
Stochastic context-free grammar
Statistical language acquisition
References
Further reading
Christopher D. Manning, Hinrich Schütze: Foundations of Statistical Natural Language Processing, MIT Press (1999), .
Stefan Wermter, Ellen Riloff, Gabriele Scheler (eds.): Connectionist, Statistical and Symbolic Approaches to Learning for Natural Language Processing, Springer (1996), .
Pirani, Giancarlo, ed. Advanced algorithms and architectures for speech understanding. Vol. 1. Springer Science & Business Media, 2013.
Grammar frameworks
Probabilistic models |
https://en.wikipedia.org/wiki/Hamza%20Roberto%20Piccardo | Hamza Roberto Piccardo was a member of the Directive Council of UCOII, the Union of Islamic Communities in Italy, as well as spokesperson of the European Muslim Network. He is not currently serving any executive position in UCOII.
After the end of his military service in 1974, Piccardo went to Africa and crossed the Sahara desert. He met Muslims there and learned about Islam. He converted to Islam in 1975. In 1984 he started to pray and about five years later, he started fasting.
He founded the publishing house Al Hikma in 1993 and published the first edition of the Quran in Italian translated by Muslims, among other books.
References
External links
An interview with Hamza Riccardo
Online Quran Project An Italian translation of the Quran by Hamza Roberto Piccardo]
Living people
Converts to Islam
Translators of the Quran into Italian
Italian Muslims
Muslim Brotherhood leaders
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Ignasi%20Terraza | Ignasi Terraza (born 14 July 1962) is a Spanish jazz pianist.
Blind from the age of 10, he studied piano as well as Computer Engineering and was the first blind person in Spain to obtain this degree. After three years dividing his time between his profession and music, in 1991, he decided to dedicate himself entirely to jazz, accompanying vocalists such as Kalil Wilson, Charmin Michelle, Randy Greer, Michelle McCain, Lavelle or Stacey Kent, and jazz musicians Frank Wess, Jesse Davis, Gene "The Mighty Flea" Conners, Teddy Edwards, Ted Curson, Spike Robinson, Ralph Lalama or Brad Leali.
As a leader, his trios and quartets have included bassists Pierre Boussaguet, Mario Rossy, Javier Colina, Jules Bekoko and Horacio Fumero, among others, and Jean Pierre Derouard, Gregory Hutchinson, Walter Perkins, Bobby Durham, Peer Wyboris, Jo Krause, Esteve Pi or Julian Vaughn on drums.
One particular association, divided into two stints (1985–1988 and 1996–2000), was with vibraphonist and drummer Oriol Bordas, playing in trio/quartet formations and with the Barcelona Jazz Orchestra.
Since 2003 he has been teaching jazz piano at the Escola Superior de Música de Catalunya - Catalonia College of Music. Since 2006, his trio has accompanied singer Susana Sheiman at venues in both Madrid and Barcelona.
Since 2009, he has featured in several public appearances and records of the Sant Andreu Jazz Band, a youth big band founded by Joan Chamorro in Barcelona and formed by multi-instrumentalists such as Andrea Motis, Rita Payés and many others. He is also a member of Motis Chamorro Quintet which includes Josep Traver and Esteve Pi.
Terraza's 2009 recording, Plaça Vella (2009), with the Josep Maria Farràs & Ignasi Terraza Trio features two tracks with saxophonist Jesse Davis.
In 2013, he premiered his Suit Miró at Washington's National Gallery of Art on the occasion of that museum's monographic exhibition on the Catalan artist Joan Miró and the following year performed the same suite at Madrid's Museo Reina Sofía on the occasion of International Museum Day.
Awards
From 1990 to 1993, he co-led, with US guitarist David Mitchell, the Mitchell-Terraza Quartet, winning the "best new group" award at the 1991 Festival Internacional de Jazz de Getxo.
2009, Terraza won the Jazz Piano Competition at the Jacksonville Jazz Festival.
Discography
Festival Internacional de Jazz de Getxo (1991) - Mitchell-Terraza Quartet
Shell Blues (1993) - Mitchell-Terraza Quartet
Miaow! (1995) - Four Kats Jazz Quartet
The Voice - The Romance of Jazz (1996) - Randy Greer
Let Me Tell You Something (1999) - Ignasi Terraza Trio
Jazz a les Fosques/Jazz en la oscuridad (1999) - Ignasi Terraza Trio
September in the Rain (1999) - Barcelona Jazz Orchestra
Night Sounds (2000) - Toni Solá & Ignasi Terraza Trio
Christmas Swings in Barcelona (2003) - Randy Greer & Ignasi Terraza Trio
IT’s Coming (2004)
Confessin’ (2004) Oriol Romaní & Ignasi Terraza
In a Sentimental Groove (2005) - Ignasi Terraza Trio
|
https://en.wikipedia.org/wiki/LRK%20%28disambiguation%29 | LRK could refer to:
Little Rock (Amtrak station), Arkansas, US, Amtrak station code
Long Range Kinematic
LR(k), a type of LR parser in computing |
https://en.wikipedia.org/wiki/Friends%20of%20the%20Earth%20Scotland | Friends of the Earth Scotland (FoE Scotland) is a Scottish charity and an independent member of the Friends of the Earth International network of 73 environmental organisations. It is one of the 30 national organisations that Friends of the Earth Europe represents and unites at the European level.
FoE Scotland has a membership of around 3,000 people in Scotland.
History
Scotland’s first Friends of the Earth group was formed in 1972 and the first joint meeting of all Scotland’s local groups was held in 1977.
In 1980 it became legally independent of Friends of the Earth Ltd. By 1982 it had a membership of around 1,200. FoE Scotland has been registered as a charity since 1 January 1992, and is an independent charity registered with the Office of the Scottish Charity Regulator (OSCR), Scottish charity number SC 003442. FoE Scotland operates separately from Friends of the Earth in England, Wales and Northern Ireland (EWNI).
In 1991 Kevin Dunion was appointed as their first director, leaving in 2003 to become the Scottish Information Commissioner. Richard Dixon was appointed Director in 2013.
In 2003 Friends of the Earth Scotland won The Guardian newspaper's "Charity of the Year" Award. In 2021, FoE Scotland played a leading role in the civil society response to the UN Climate Talks (COP26) coming to Glasgow, helping to organise the largest ever climate march in Scotland and the UK.
Previous campaigns
Previous campaigns have included:
Clean up Royal Bank of Scotland. Called for ethical and responsible behaviour from banks who were bailed out with public money
Carbon Dinosaurs. FoE Scotland drew attention to the presence of the most polluting coal-fired power plants in 2003
Hunterston. In 2010 it campaigned against plans for a new coal-fired power station at Hunterston in Ayrshire. In June 2012 Ayrshire Power withdrew their planning application
M74 protests. FoE Scotland were involved with protests against extension of the M74, withdrawing their legal action in 2006
South Harris super quarry. It campaigned against a planned superquarry in South Harris 1994−2004
Climate change legislation. FoE Scotland pushed for Scotland to have strong climate change legislation. The Climate Change (Scotland) Act 2009 was seen as world-leading when it was passed
Local groups
Friends of the Earth Scotland has a network of ten local groups. There are groups in Aberdeen, Dumfries, Edinburgh, Falkirk, Fife, Glasgow, Inverness & Ross, Moray, Stirling and Tayside.
See also
Anti-nuclear movement in the United Kingdom
Nuclear power in Scotland
References
External links
1980 establishments in Scotland
Environmental organisations based in Scotland
Charities based in Scotland
Friends of the Earth
Anti-nuclear organizations
Environmentalism in Scotland
Anti-nuclear movement in Scotland |
https://en.wikipedia.org/wiki/Japan%20National%20Route%20130 | is a national highway connecting Port of Tokyo and Route 15 in Tokyo, Japan. It is the second shortest national highway in Japan.
Route data
Length: 0.5km
Origin: Port of Tokyo
Terminus: Minato, Tokyo (ends at Junction with Route 15)
History
1953-05-18 - Second Class National Highway 130 from Port of Tokyo to intersection with Route 15)
1965-04-01 - General National Highway 130 from Port of Tokyo to intersection with Route 15)
References
130
Roads in Tokyo |
https://en.wikipedia.org/wiki/Federated%20portal%20network | Federated portal network (FPN) is a framework for remote content sharing between enterprise portals.
In a federated portal network each portal can act as a producer, exposing the content to other portals or as a consumer, using the content shared by other producer portals.
A federated portal network is used, for example, in order to distribute applications according to different service-level agreements (SLA), maintain autonomous portals that are independent of the central corporate portal or allow subsidiaries to lower total cost of ownership (TCO) by sharing applications from one producer portal.
FPN has currently two modes of operation: remote delta links (RDL) and remote role assignment (RRA).
See also
Federated content
External links
Implementing a Federated Portal Network
Architecture for Federated Portals
Software architecture |
https://en.wikipedia.org/wiki/Air%20Greece | Air Greece was an airline based in Heraklion, Greece. It was one of the first private airlines to operate scheduled domestic flights in Greece.
Code data
IATA Code: JG
ICAO Code: AGJ
Callsign: Air Greece
History
Air Greece was established in 1994 by Cretan businessmen and started operations in
the same year using two leased ATR72 turboprops on domestic routes. In April 1997
a third ATR72 was added to the fleet, followed by the lease of two Fokker 100s in May
and June 1999. Delivery of the Fokkers marked the international expansion of the
company and new routes to destinations in Germany were opened.
In 1999, passenger ferry company Minoan Lines acquired a 51% stake in Air
Greece. However, at that time Air Greece
was facing strong competition from Aegean Airlines, Cronus Airlines and
Olympic Airways, forcing it to begin a cooperation with Aegean which ended
in a full takeover by Aegean in December 1999.
During 2000, Air Greece's original owners made an unsuccessful attempt to
launch Cretan Airways as its successor.
Services
Air Greece operated scheduled services from/to the following cities:
Athens, Thessaloniki, Rhodes, Santorini, Araxos, Kavala, Mytilene, Ioannina and Chania.
International destinations:
Cologne, Stuttgart and Düsseldorf.
Fleet
The fleet of Air Greece consisted of the following aircraft:
3 ATR-72 turboprops. (SX-BAO/cn 326, SX-BAP/cn 330, SX-BFK/cn 313)
2 Fokker-100 jets. (SX-BGL/cn 11387, SX-BGM/cn 11476)
References
External links
Air Greece history from Airliners.gr
Air Greece fleet
Air Greece aircraft photos from Airliners.net
Defunct airlines of Greece
Airlines established in 1994
Airlines disestablished in 1999
1999 disestablishments in Greece
Greek companies established in 1994 |
https://en.wikipedia.org/wiki/22B3 | 22B3 is the only studio album by the American pop rock band Device, which was released in 1986.
Track listing
Personnel
Paul Engemann – vocals
Holly Knight – bass, keyboards, drum programming, vocals
Gene Black – acoustic and electric guitars
Production
Produced by Mike Chapman
Recorded by Mike Chapman, with assistance by Brian Scheuble
Mixed by George Tukto
Tracks 1-9 published by The Makiki Pub. Co. Ltd./Arista Music Inc.
Track 10 published by The Makiki Pub. Co. Ltd./Knighty Knight Music/Arista Music Inc.
Charts
Singles
References
Device (pop rock band) albums
1986 debut albums
Chrysalis Records albums
Albums produced by Mike Chapman |
https://en.wikipedia.org/wiki/SoftServe | SoftServe, Inc., founded in 1993 in Lviv, Ukraine, is a technology company specializing in consultancy services and software development.
SoftServe provides services in the fields of big data, Internet of things, cloud computing, DevOps, e-commerce, computer security, experience design, and health care. With its United States headquarters in Austin, Texas and European headquarters in Lviv, Ukraine, the company employes more than 12,000 people in 58 offices in 14 countries. It is one of the largest employers for software developers in Eastern Europe, and the largest outsourcing and outstaffing IT company in Ukraine.
History
Early years
SoftServe was founded in 1993 in Lviv, Ukraine. Started by two post-graduate students of Lviv Polytechnic, it began as a software development company with headquarters in Lviv. The company was initially supported by the Rensselaer Polytechnic Institute Incubator Center and its first known client was General Electric. The company opened its first office in the United States in 2000. SoftServe was instrumental in building Microsoft Bird's Eye service in 2004. It used the same concept that was later used by Google for its Google Street View. For its work on the project, SoftServe was invited to speak at Microsoft's annual conference where it was used as an example of business applications that could be built by technology corporations.
Expansion and educational initiatives
In 2006, SoftServe founded SoftServe University. It became the company's corporate training program for improving developers and retraining specialists. Based in Ukraine, it also offers international IT Professional certificates to employees who complete the program. With the launch of SoftServe University, the company became the first to establish a corporate university in Ukraine. In 2008, SoftServe also founded Lviv Business School at Ukrainian Catholic University.
Growth and acquisitions
SoftServe opened its United States headquarters in Fort Myers, Florida in 2008 and began holding an annual conference. By 2012, SoftServe was one of the largest IT outsourcing companies in Ukraine with 2,189 employees, third only to EPAM Systems and Luxoft.
In 2014 SoftServe moved its United States headquarters from Florida to One Congress Plaza, in Austin, Texas (The company had previously operated an office out of Austin since 2013 and officially moved its headquarters to One Congress Plaza in 2014.) The same year SoftServe opened offices in London, Amsterdam, Sofia, Wroclaw, and Stockholm. The same year its employee base climbed to 3,900 employees Also in 2014, the company acquired Amsterdam-based tech services firm Initium Consulting Group BV. (Founded in 2012 and served mainly healthcare and private equity industries.) SoftServe also acquired European IT company UGE UkrGermanEnterprise GmbH.
In 2015 SoftServe opened a new European headquarters in Lviv, Ukraine. It also organized an event in San Francisco, California along with IT professionals f |
https://en.wikipedia.org/wiki/MGM%20%28TV%20channel%29 | MGM Channel was a global-based television network that was launched in 1999 by Metro-Goldwyn-Mayer Studios that aired movies from MGM's library, including West Side Story, Midnight Cowboy, The Terminator, Moonraker, The Manchurian Candidate, The Black Stallion, Blown Away, amongst many others. The network had access to the Metro-Goldwyn-Mayer library of films, comprising approximately 4,000 titles, and over 10,400 episodes of television programming.
Following AMC Networks' acquisition of Chellomedia, it was announced on 4 August 2014 that MGM Channel would be rebranded as AMC in late 2014. On 5 November 2014, MGM became a Hungarian Version of AMC.
As of 2015, MGM Channel has been indirectly found out to have continued airing in Ireland, Austria, Switzerland, Germany, Iceland and some other countries.
On 1 January 2015, the Asian version of AMC was launched, replacing MGM in Asia and also in Sri Lanka for the first time it received AMC.
MGM HD
MGM HD was a high definition version of the channel.
See also
MGM Networks
MGM HD
References
External links
Television channels and stations established in 1999 |
https://en.wikipedia.org/wiki/The%20Big%20Electric%20Cat | The Big Electric Cat, named for an Adrian Belew song, was a public access computer system in New York City in the late 1980s, known on Usenet as node dasys1.
History
Based on a Stride Computer brand minicomputer running the UniStride Unix variant, the Big Electric Cat (sometimes known as BEC) provided dialup modem users with text terminal-based access to Usenet at no charge.
This was the first such system in New York and one of the first in the world. Previously, access to Usenet had been almost exclusively through systems at universities, or a few government and very few commercial installations. While Bulletin Board System culture and Fidonet existed at the time, systems which allowed the general public to access Usenet were virtually unknown. As with many early Internet and Usenet systems, a community began to form among users of the system which had occasional outings to restaurants.
BEC was started by four college students, with one of them, Rob Sweeney, owning the equipment. The other sysops were Charles Foreman, Lee Fischman, and Richard Newman.
A list of BBSes in the 212 Area Code contains the following note, attributed to Lee Fischman
I was one of the sysops. Originally we were set up (illicitly) in the computer room of a midtown advertising agency. It is a VERY amusing story -- pity you didn't know about it before the movie! We eventually migrated to the offices of a communications firm elsewhere in the city. I still have the Big Electric Cat user manual, with its very entertaining cover. Robert Sweeney was killed in a motorcycle accident in 2001.
The movie referred to is BBS: The Documentary.
BEC was not intended to be a profit-making operation, charging fees that were designed only to cover operating costs, (Phrack reports $5 per month for an account at the end of 1989, though the system may have in fact been out of operation by then, and other sources note that the system was supported by donations) and relying entirely on volunteer labor.
In mid-1990, after increasingly unreliable operation, The Big Electric Cat suffered what proved to be fatal hardware failure, leaving a gap which was filled by some its users founding one of the first commercial ISPs ever, Panix.
2600 Magazine founder Eric Corley used a Big Electric Cat account.
References
Panix (ISP)
History of the Internet
Shell account providers |
https://en.wikipedia.org/wiki/Cape%20Verdeans%20in%20Italy | The presence of Cape Verdeans in Italy dates back to the 1960s.
Numbers
There are various conflicting data about the size of the Cape Verdean population. The 2001 Italian census found 3,263 residents of Italy born in Cape Verde, 628 of whom held Italian citizenship. In contrast, the Caboverde Informatics Project of the University of Massachusetts Dartmouth estimated that by 1995 their population already had reached 10,000. Another study asserted that Italy had 4,004 Cape Verdean legal residents in 2002. The Cape Verdean embassy in Italy listed 9,978 of their nationals in Italy as of 2007.
Migration history
Prior to independence in 1975, Cape Verdean immigrants were registered as Portuguese immigrants from the overseas province of Portuguese Cape Verde. Italy's first Cape Verdean migrants arrived in 1957. Early migration was almost exclusively female. The migrants consisted of young women recruited for live-in domestic work in Italy by Capuchin friars living in São Nicolau, Cape Verde. Roughly 3,500 had come to Italy in this manner by the end of 1972. The migrants settled primarily in Rome and Naples, with much smaller concentrations in Palermo and Milan.
Employment
Domestic work remains an important source of employment for Cape Verdean women, though most have shifted to hourly work and living away from their workplace. Two factors have limited the shift away from domestic work into other lines of employment such as heavy industry: only a limited number of Cape Verdean men have migrated to Italy, and the Cape Verdeans are concentrated in the less-industrialised southern parts of Italy. They face increasing employment competition from Eastern European migrants. There is a weak trend towards entrepreneurship and self-employment.
Education
Migrants generally had a low level of education upon their arrival. Illiteracy was common. However, many migrants took advantage of the education offered by the Portuguese School in Rome, which was officially recognised by the Portuguese Ministry of Education, and then afterwards entered into Italian universities.
Social integration
In general, Cape Verdeans have not faced as severe a level of discrimination as other migrant groups like Moroccans. Officials generally view them as well-integrated and unproblematic. Their early presence in Italy was characterised by social and political invisibility, but by the 1980s and 1990s, as Italians began to understand that their country had become an importer rather than an exporter of migrant labour as it had traditionally been, more public attention was focused on the Cape Verdean presence.
One study found that roughly half of Cape Verdeans were married to Italians. It is common for children to be sent back to Cape Verde for their early education and then return to Italy when they are older.
References
Notes
Sources
African diaspora in Italy
Cape Verdean diaspora
Ethnic groups in Italy |
https://en.wikipedia.org/wiki/Cuban%20Missile%20Crisis%3A%20The%20Aftermath | Cuban Missile Crisis: The Aftermath, also known as The Day After: Fight for Promised Land and known in Russia as Caribbean Crisis (), is a real-time tactics computer game developed by Russian developer G5 Software and published by 1C Company in Russia, Black Bean Games in Europe and Strategy First in North America. It was made using Nival Interactive's Enigma engine and is similar to Blitzkrieg.
Plot
The premise of the game is based on a potential outcome of the Cuban Missile Crisis, where on October 27th, 1962 a USAF U-2 spy plane is shot down over Cuba. The action precedes armed conflict between the United States and the Soviet Union, which in turn leads to a nuclear exchange, causing millions of casualties across the globe. After the exchange, the war is continued by the USSR, the Anglo-American Alliance, China and the European Alliance. Each faction, as played out in their campaigns are attempting to avoid the imminent nuclear winter, and scramble towards Africa, South America, Asia and the Pacific.
Campaigns
Anglo-American Alliance: This consists of the surviving elements of the United States and the United Kingdom. Retreating from the wasteland of Europe, the alliance invades Yugoslavia and Burma to capture vital resources, then invading Spain to funnel the resources through Gibraltar, now occupied by the Europeans. By the end of the war the Anglo-American alliance settle in South America, Southern Africa and Australia. Numerically inferior to the USSR and China, the alliance boasts the strongest navy in game, referenced by their dynamic global campaign.
European Alliance: Headed primarily by France and a reunited Germany, this campaign revolves around slowing the Soviet invasion of Europe, assisting Sweden and the other Nordic countries as well as Italy, before relocating to the Iberian Peninsula to assist the evacuation of civilians to West Africa, where the Europeans eventually settle, but with the least amount of territory at the end of the game.
USSR: Boasting enormous manpower and resources, the Soviets are arguably one of the strongest factions in game. Beginning in Eastern Europe, the Soviets crush straggling European forces in Soviet territory, most of which is marred by the nuclear exchange. Pushing to Belgium and France, the Soviets complete the invasion of Europe, defeating the European Alliance there as well as the Anglo-Americans in Yugoslavia. A surprise attack by China in Siberia is subsequently dealt with afterwards. In order to relocate to friendly Egypt, the Soviets engage Arab-Israeli forces to open up a corridor. The Soviets settle in Eastern Africa and Middle East.
China: Arguably the weakest faction in-game, the Chinese initially side with the Soviet Union and conduct air strikes on US bases in the Philippines. The US retaliates by destroying Beijing with nuclear weapons, killing many members of the Politburo, including Mao himself. A revolution occurs against Mao's loyalists, with the player commanding revolutio |
https://en.wikipedia.org/wiki/Script.NET | Script.NET or S# is a metaprogramming language that provides scripting functionality in Microsoft .NET applications, allowing runtime execution of custom functionality, similar to VBA in Microsoft Office applications. The syntax of Script.NET is similar to JavaScript. It is designed to be simple and efficient scripting language allowing to customize .NET applications. The language has a true runtime interpreter, and it is executed without generating additional in-memory assemblies.
Script.NET is an open-source project.
Metaprogramming features
Script.NET has a special quotation operator <[ program ]> which returns the AST of a given program. Additionally, the AST of the current program may be accessed with the prog object.
Here is an example:
//Create an AST for MessageBox.Show('Hello'); program
ast = <[ MessageBox.Show('Hello'); ]>;
//Add this AST at the end of the current program
prog.AppendAst(ast);
The <[ ... ]> operator and prog objects allow Script.NET to generate new scripts or modify existing scripts at runtime.
Generalized objects
Script.NET includes so-called
There is a special operator := called Mutantic or Generalized assignment. Its purpose is to assign values of DataMutant fields to corresponding fields of an object of any type.
Example. Creation and Usage of MObject:
// Create Data Mutant Object
mobj = [ Text -> 'Hello from Mutant' ];
// Set Additional Fields
mobj{{Not a typo|.}}Top = 0;
mobj{{Not a typo|.}}Left = 0;
// Set corresponding fields of Windows Form object–flight!
// ''':='''
deepasitiswide<<"meta">>.:{Social-Secruity-Administrative:4sixsix|81|2289}
Examples
Hello world
MessageBox.Show('Hello World!');
Bubble sort without output function
a=[17, 0, 5, 3,1, 2, 55];
for (i=0; i < a.Length; i=i+1)
for (j=i+1; j < a.Length; j=j+1)
if (a[i] > a[j] )
{
temp = a[i];
a[i] = a[j];
a[j] = temp;
}
s = 'Results:';
for (i=0; i < a.Length; i++)
s = s + ',' + a[i];
MessageBox.Show(s);
RSS Reader
a = new XmlDocument();
a.Load('http://www.codeplex.com/scriptdotnet/Project/ProjectRss.aspx');
MessageBox.Show('CodePlex Script.NET RSS::');
foreach (n in a.SelectNodes('/rss/channel/item/title'))
MessageBox.Show(n.InnerText);
Stack
Stack limited to 20 elements using Design by contract feature
function Push(item)
[
//Limit to 10 items
pre(me{{Not a typo|.}}Count < 10 );
post();
invariant();
]
{
//me is mutated object,
//stack in this case
me.Push(item);
}
function Pop()
[//Check emptiness hardik
pre(me{{Not a typo|.}}Count > 0);
post();
invariant();
]
{
return me.Pop();
}
stack = new Stack<|int|>();
//Create Mutant hardik
//1. Set Functions, override stack{{Not a typo|.}}Push
mObject=[Push->Push,PopCheck->Pop];
//2. Capture object
mObject.Mutate(stack);
for (i=0; i<5; i++)
mObject.Push(i);
Console.WriteLine((string)mObject.PopCheck());
See also
L Sharp - Lisp-like scripting language for .NET
Boo - a Python Like language for .NET platform
IronPython - an implementati |
https://en.wikipedia.org/wiki/Junivan | Junivan Soares de Melo (born 20 November 1977), known as just Junivan, is a retired Brazilian footballer.
Career statistics
References
External links
Brazilian FA Database
1977 births
Living people
Brazilian men's footballers
Brazilian expatriate men's footballers
OFC Belasitsa Petrich players
PFC Lokomotiv Plovdiv players
Kayseri Erciyesspor footballers
Turan Tovuz players
Expatriate men's footballers in Bulgaria
Expatriate men's footballers in Turkey
Expatriate men's footballers in Azerbaijan
Men's association football forwards
Sportspeople from Amazonas (Brazilian state)
Azerbaijan Premier League players
First Professional Football League (Bulgaria) players
Süper Lig players |
https://en.wikipedia.org/wiki/DCG | DCG may refer to:
DCG Development, a development firm in Clifton Park, New York; owners of Clifton Park Center
DCG Radio-TV Network, Quezon Province, Philippines
DCG-IV, a research drug
Definite clause grammar, a means of expressing grammatical relationships
Democratic Montenegro (Demokratska Crna Gora), a political party in Montenegro
Deputy Commanding General (), wartime head of a military district in the German Empire and Nazi Germany
Digital Currency Group, is an venture capital company focusing on the digital currency market
Discontinuous gas exchange, a physiological pattern of respiratory gas exchange used by insects
Discounted cumulative gain, a performance measure for search engine ranking algorithms
Doğu Çalışma Grubu, an alleged group within the Turkish military
Guatemalan Christian Democracy (Spanish: Democracia Cristiana Guatemalteca), a political party
BCCM/DCG, a diatom collection part of the Belgian Co-ordinated Collections of Micro-organisms
The DCG Brothers, a Chicago based Hip Hop duo.
See also
Digital collectible card game (DCCG) |
https://en.wikipedia.org/wiki/Serial%20computer | A serial computer is a computer typified by bit-serial architecture i.e., internally operating on one bit or digit for each clock cycle. Machines with serial main storage devices such as acoustic or magnetostrictive delay lines and rotating magnetic devices were usually serial computers.
Serial computers require much less hardware than their parallel bus counterpart, but are much slower. There are modern variants of the serial computer available as a soft microprocessor which can serve niche purposes where size of the CPU is the main constraint.
The first computer that was not serial and used a parallel bus was the Whirlwind in 1951.
A serial computer is not necessarily the same as a computer with a 1-bit architecture, which is a subset of the serial computer class. 1-bit computer instructions operate on data consisting of single bits, whereas a serial computer can operate on N-bit data widths, but does so a single bit at a time.
Serial machines
EDVAC (1949)
BINAC (1949)
SEAC (1950)
UNIVAC I (1951)
Elliott Brothers Elliott 152 (1954)
Bendix G-15 (1956)
LGP-30 (1956)
Elliott Brothers Elliott 803 (1958)
ZEBRA (1958)
D-17B guidance computer (1962)
PDP-8/S (1966)
General Electric GE-PAC 4040 process control computer
F14 CADC (1970) transferred all data serially, but internally operated on many bits in parallel
Kenbak-1 (1971)
Datapoint 2200 (1971)
HP-35 (1972)
Digit-serial HP Saturn-based calculators from the HP-71B (1974) to the HP 50g (2006–2015)
National Semiconductor SC/MP (1976)
Massively parallel
Most of the early massive parallel processing machines were built out of individual serial processors, including:
ICL Distributed Array Processor (1979)
Goodyear MPP (1983)
Connection Machine CM-1 (1985)
Connection Machine CM-2 (1987)
MasPar MP-1 (1990) 32-bit architecture, internally processed 4 bits at a time
VIRAM1 computational RAM (2003)
See also
1-bit computing
BKM algorithm
CORDIC algorithm
References
Further reading
(xiv+306 pages)
(8 pages)
Classes of computers
Serial computers |
https://en.wikipedia.org/wiki/Comparison%20of%20machine%20translation%20applications | Machine translation is an algorithm which attempts to translate text or speech from one natural language to another.
General information
Basic general information for popular machine translation applications.
Languages features comparison
The following table compares the number of languages which the following machine translation programs can translate between.
(Moses and Moses for Mere Mortals allow you to train translation models for any language pair, though collections of translated texts (parallel corpus) need to be provided by the user. The Moses site provides links to training corpora.)
This is not an all-encompassing list. Some applications have many more language pairs than those listed below. This is a general comparison of key languages only. A full and accurate list of language pairs supported by each product should be found on each of the product's websites.
See also
Machine translation
Machine translation software usability
Computer-assisted translation
Comparison of computer-assisted translation tools
External links
Apertium wiki (list of language pairs and licence information)
Xerox Easy Translator Service (list of language pairs)
Bing Translator Language List
Haitian Creole support in Bing/Microsoft Translator
Microsoft Research: Syntactically Informed Phrasal SMT
List of supported languages in Google Translate
References
Evaluation of machine translation
Natural language processing software
Machine translation applications |
https://en.wikipedia.org/wiki/Jump-and-Walk%20algorithm | Jump-and-Walk is an algorithm for point location in triangulations (though most of the theoretical analysis were performed in 2D and 3D random Delaunay triangulations). Surprisingly, the algorithm does not need any preprocessing or complex data structures except some simple representation of the triangulation itself. The predecessor of Jump-and-Walk was due to Lawson (1977) and Green and Sibson (1978), which picks a random starting point S and then walks from S toward the query point Q one triangle at a time. But no theoretical analysis was known for these predecessors until after mid-1990s.
Jump-and-Walk picks a small group of sample points and starts the walk from the sample point which is the closest to Q until the simplex containing Q is found. The algorithm was a folklore in practice for some time, and the formal presentation of the algorithm and the analysis of its performance on 2D random Delaunay triangulation was done by Devroye, Mucke and Zhu in mid-1990s (the paper appeared in Algorithmica, 1998). The analysis on 3D random Delaunay triangulation was done by Mucke, Saias and Zhu (ACM Symposium of Computational Geometry, 1996). In both cases, a boundary condition was assumed, namely, Q must be slightly away from the boundary of the convex domain where the vertices of the random Delaunay triangulation are drawn. In 2004, Devroye, Lemaire and Moreau showed that in 2D the boundary condition can be withdrawn (the paper appeared in Computational Geometry: Theory and Applications, 2004).
Jump-and-Walk has been used in many famous software packages, e.g., QHULL, Triangle and CGAL.
References
.
.
.
.
.
Triangulation (geometry)
Algorithms |
https://en.wikipedia.org/wiki/Uncover | Uncover may refer to:
Uncover, EP by Swedish singer Zara Larsson
Uncover (song), the title track
"Uncover", a song by Loona Odd Eye Circle from Max & Match
UnCover, an online database at the Colorado Alliance of Research Libraries
Uncover, a CBC produced true crime podcast
unc0ver, an iOS jailbreak.
See also
Uncovered (disambiguation)
Cover (disambiguation) |
https://en.wikipedia.org/wiki/KTPL | KTPL (88.3 FM) is a radio station broadcasting a Christian radio format, carrying programming from the Moody Bible Radio network from Chicago.
It was previously branded as "Power 88", which played a blend of upbeat music ranging from Christian CHR artists to Hot 'Praise & Worship' music. The switch to Moody Bible was made on December 15, 2008.
Licensed to Pueblo, Colorado, United States, it serves the Pueblo area. The station is currently owned by Educational Communications Of Colorado Springs.
External links
TPL
Moody Radio affiliate stations
Radio stations established in 1977
TPL |
https://en.wikipedia.org/wiki/Anderson%20Township%2C%20Rush%20County%2C%20Indiana | Anderson Township is one of twelve townships in Rush County, Indiana. As of the 2020 Census data, the population is 1,153. There are a total of 477 houses.
History
Anderson Township was organized in 1830.
The Rush County Bridge No. 188 was listed on the National Register of Historic Places in 2000.
Geography
According to the 2020 census, the township has a total area of , of which (or 99.92%) is land and (or 0.08%) is water.
Unincorporated towns
Milroy at
Williamstown at
(This list is based on USGS data and may include former settlements.)
Other statistics
The median age of Anderson Township is 51.8 years old. The population is 51% female & 49% male. 96% of the population is white, while 4% is hispanic. A little under 1% are two or more races. The per capita income is $25,021 while the median household income is $54,583. There are 477 households in Anderson Township, with an average of 2.4 persons in each household.
References
External links
Indiana Township Association
United Township Association of Indiana
Townships in Rush County, Indiana
Townships in Indiana |
https://en.wikipedia.org/wiki/MinWin | MinWin is a term used informally by Microsoft to describe the kernel and operating system components that form the basis of releases of Microsoft Windows starting with Windows Vista. The term was first used in 2003 to describe approximately 95% of the common components of the operating system, but has over time come to refer to a significantly smaller portion. Its most recent and most well-known variation was a minimalistic, self-contained set of Windows components that shipped as part of Windows 7 and Windows Server 2008 R2.
Background
Through the history of Microsoft Windows, the core of the operating system was generally designed to be a single large, inter-related set of components. With successive releases, the set of components considered to be the core of Microsoft Windows numbered into the thousands, with numerous dependencies that prevented the company from producing a version of Microsoft Windows that (for example) didn't include the graphical user interface and printing components. Further complicating this was the issue that many configuration tasks could only be performed using the graphical user interface.
In an April 2003 interview coinciding with the release of Windows Server 2003, Rob Short, the vice-president of the Windows Core Technology group, explained that creating a command-line version would involve "looking at the layers and what's available at each layer and how do we make it much closer to the thing the Linux guys have -- having only the pieces you want running. That's something Linux has that's ahead of us, but we're looking at it. We will have a command line-only version, but whether it'll have all the features in is another matter. A lot of the tools depend on having the graphical interface." Windows Server 2003 was seen by reviewers such as Direction On Microsoft's Michael Cherry as having reduced the reliance on graphical tools to configure the operating system, but the operating system itself still required the full graphical interface to be installed, even on servers where it would never be needed.
After Windows Server 2003's release, Rob Short assembled a team of kernel architects at Microsoft, with the intention of untangling and documenting the dependencies within the core operating system. The kernel development team had realized that they were having difficulty being able to "predict the impact of changes and to make broad, cross-group changes to Windows", and the new kernel architecture team would aim to improve software engineering practices both within the Windows kernel itself, as well as with the other components of Windows. To do this, every component of the operating system (consisting of about 5,500 distinct files in late 2005, during the development of Windows Vista) was assigned a "layer number" that represents its dependency position relative to other components, with lower-numbered components being closer to the core of the operating system, and higher numbers representing high-leve |
https://en.wikipedia.org/wiki/Germany%201985 | Germany 1985 is a computer wargame published in 1983 by Strategic Simulations. Developed by Roger Keating, it was the first in the "When Superpowers Collide" series, and was followed by RDF 1985, Baltic 1985: Corridor to Berlin and Norway 1985.
Gameplay
The game presents the hypothetical situation of the Soviet Union invading southern and central West Germany where NATO forces must contain and repel them. The player may choose to play either the NATO or Soviet forces, and can play in turns against another human component or against the computer.
There are two battle scenarios. The first, called "Advance-to-Contact" involves Soviet and American forces as they rush to establish a cohesive front line. The second is "Invasion" which starts with an initial Soviet drop of airborne divisions behind NATO lines. In both cases the victory condition is the same: the player who controls the greatest number of towns wins.
Reception
Computer Gaming Worlds reviewer, an Armor Branch officer with the United States Army, stated "I haven't been disappointed". He stated that the terrain was generally accurate to what he saw while stationed in Germany for eight years, and approved of the game's two separate scenarios. Minor criticisms included the criteria for victory and the lack of mines or nuclear combat. Electronic Games wrote that the game "illustrates the terrible cost of" a conventional war in Germany "even more dramatically than any book or magazine article could". The magazine stated that Germany 1985 was "the most advanced computer war game yet" with "stunning hi-res maps", and concluded that it "does a remarkable job of simulating the way a conventional war would have to be fought ... any war gamer will feel his efforts have been richly rewarded".
Reviews
Casus Belli #15 (June 1983)
Legacy
The game had three sequels: RDF 1985, which simulated a battle between the American Rapid Deployment Force and Soviet forces for control of the Saudi Arabian oil fields; Baltic 1985: Corridor to Berlin, in which NATO forces were tasked with relieving Allied soldiers trapped in Berlin at the beginning of the war; and Norway 1985, which showed the battle between Soviet forces and NATO ski-troops for control of Norway.
In addition, the 1981 SSI game Southern Command, which was a simulation of the Israeli counterattack across the Suez Canal during the 1973 war with Egypt, used the same combat resolution system.
References
External links
Germany 1985 at Gamebase 64
Box, manual and screenshots
1983 video games
Apple II games
Cold War video games
Commodore 64 games
Video games set in Germany
War video games set in Europe
Video games set in 1985
Alternate history video games
Multiplayer and single-player video games
Strategic Simulations games
Video games developed in Australia
Computer wargames
Video games set in East Germany |
https://en.wikipedia.org/wiki/Cuddle%20time | Cuddle time may refer to:
Cuddle time (attachment therapy)
Cuddle party, non-sexual group physical intimacy
Cuddle Time, a programming segment on Tiny Pop |
https://en.wikipedia.org/wiki/Animal%20Planet%20%28Australia%20and%20New%20Zealand%29 | Animal Planet is a television channel which launched locally in Australia exclusively on Optus Television in October 1999. The channel is dedicated to programming that highlights the relationship between humans and animals. It has since expanded to multiple carriers.
It was added to Foxtel on 1 December 2003 in Australia and screen on Sky in New Zealand.
It was formerly available on SelecTV from March 2007 until the closure of its English service in late 2010. It was available on Fetch TV until 1 February 2015. It would later be re-added to the platform on 1 May 2020.
Programmes
Crikey! It's the Irwins
Dodo Heroes
Dr. Jeff: Rocky Mountain Vet
Jeremy Wade's Dark Waters
Pit Bulls & Parolees
Puppy Bowl
The Aquarium
The Zoo (2016)
Evan Goes Wild
Extinct or Alive
Scaled
Secret Life of the Zoo
Bondi Vet
Tanked
Hanging with the Henderson's
The Vet Life
Animal Planet also hosts some David Attenborough content.
References
Animal Planet
Television networks in Australia
Television channels and stations established in 1999
English-language television stations in Australia
English-language television stations in New Zealand
Television channels in New Zealand
1999 establishments in Australia
Warner Bros. Discovery Asia-Pacific |
https://en.wikipedia.org/wiki/Peter%20Meakin | Peter Jeremy Meakin (born 12 October 1942) is an English Australian journalist who has worked as news/current affairs director for all three of Australia's commercial television networks (Nine Network, Seven Network and Network Ten).
Early life
Meakin was born in Castleford, West Yorkshire, England in 1942. His family emigrated to Australia where he attended St Peter's College, Adelaide.
Career
Meakin joined the Nine Network in 1973, where he worked for thirty years, eventually becoming director of current affairs in 1987 and the head of news and current affairs in 1993; he was credited with the ratings success of programs including Sunday, 60 Minutes and A Current Affair. He was awarded a Walkley Award for leadership in journalism in 2002.
In April 2003, Meakin left the Nine Network acrimoniously to join the rival Seven Network, where former Nine managing director David Leckie had taken on the reins. There, he was instrumental in lifting Seven's news ratings on the east coast, and by 2007, Seven News had become the top-rating news service in each of the five major capital cities in Australia.
In November 2012, Meakin resigned as director of news and current affairs of the Seven Network after nine years in the position with Rob Raschke named as his successor. Meakin remained with the network in an advisory role for some time.
In February 2014, Meakin was poached by Network Ten to become their Executive Director of News and Current Affairs. He held the position until 2016, when he became news executive consultant, advising on the News at 5pm and The Project. As per February 2018 he was back in charge of Network Ten news and current affairs.
Controversy
Meakin's decision to expose the secret gay life of a New South Wales government minister, David Campbell, on the Seven Network raised the ire of the general public with controversial reasons to "out him" in the public interest.
Drink driving
Meakin was subject to considerable media criticism following three serious drink driving offences committed in 2006 and 2007, resulting in a licence suspension of eight years.
Although he lost a District Court appeal against his third conviction for dangerous driving, he had his original sentence, 14 months of weekend detention, reduced to 250 hours of community service.
References
1942 births
Living people
Australian journalists
English emigrants to Australia
People educated at St Peter's College, Adelaide |
https://en.wikipedia.org/wiki/List%20of%20busiest%20airports%20in%20the%20United%20Kingdom | This is a list of the busiest airports in the United Kingdom, Channel Islands, and Isle of Man ranked by total passenger traffic, compiled from Civil Aviation Authority data from 2006 to 2022. For some years the figures also show total aircraft movements and cargo volume handled at each airport. For a complete list of UK airports, see List of airports in the United Kingdom and the British Crown Dependencies.
The United Kingdom, an island country, is home to many of Europe's largest and busiest airports. London Heathrow, which handles over 60 million international passengers annually, is the largest airport in the UK. London serves as the largest aviation hub in the world by passenger traffic, with six international airports, handling over 130 million passengers in 2022, more than any other city. London's second-busiest airport, London Gatwick, was until 2016 the world's busiest single-runway airport. Manchester Airport is the United Kingdom's third-busiest airport. London Stansted and London Luton are the fourth and fifth busiest airports, respectively.
The largest airport operator in the United Kingdom is Heathrow Airport Holdings (owner of Heathrow), followed by Manchester Airports Group (owner of Manchester, Stansted and East Midlands). Together with British Airways and Virgin Atlantic, they are part of the Aviation Foundation which lobby for the aviation needs of the United Kingdom.
Statistics
Overview
2021 / 2022 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2022, from UK CAA statistics.
Source: UK CAA Airport Data 2022
2020 / 2021 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2021, from UK CAA statistics.
Source: UK CAA Airport Data 2021
2019 / 2020 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2020, from UK CAA statistics.
Source: UK CAA Airport Data 2020
2018 / 2019 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2019, from UK CAA statistics.
Source: UK CAA Airport Data 2019
2017 / 2018 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2018, from UK CAA statistics.
Source: UK CAA Airport Data 2018
2016 / 2017 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2017, from UK CAA statistics.
Source: UK CAA Airport Data 2017
2015 / 2016 data
The following is a list of the 40 largest UK airports by total passenger traffic and aircraft movements in 2016, from UK CAA statistics.
Source: UK CAA Airport Data 2016
2014 / 2015 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2015, from UK CAA statistics.
Source: UK CAA Airport Data 2015
2013 / 2014 data
The following is a list of the 40 largest UK airports by total passenger traffic in 2014, from UK CAA statistics.
Source: UK CAA Airport Data 1990–2014
2012 / 2013 data
The following is |
https://en.wikipedia.org/wiki/Kodu%20Game%20Lab | Kodu Game Lab, originally named Boku, is a programming integrated development environment (IDE) by Microsoft's FUSE Labs. It runs on Xbox 360 and Microsoft Windows. It was released on the Xbox Live Marketplace on June 30, 2009. A Windows version is available to the general public for download from Microsoft's FUSE web portal.
Overview
Kodu is a visual programming tool which is used to teach basic coding with the use of blocks and pictures. Its design allows it to be accessed by anyone.
Kodu is available to download as an Xbox One Indie Game. There is also a PC version in an open beta which is available to anyone at their website.
Kodu is different from those other projects in several key ways:
It avoids typing code by having users construct programs using visual elements via a game controller, mouse, or keyboard
Rather than a bitmapped or 2D display, programs are executed in a 3D simulation environment, similar to Alice
Kodu Game Lab has also been used as an educational learning tool in selected schools and learning centers.
Language design
Kodu's programming model is simplified and can be programmed using a gaming controller or a combination of the keyboard and mouse. It dispenses with most "serious" programming conventions, including symbolic variables, branching, loops, number and string manipulation, subroutines, polymorphism, and so on.
This simplicity is achieved by situating the programming task in a largely complete simulation environment. The user programs the behaviors of characters in a 3d world, and programs are expressed in a high-level, sensory paradigm consisting of a rule-based system or language, based on conditions and actions similarly to AgentSheets.
The typical "hello world" of Kodu is:
see - fruit - move - towards
The grammar, as it were, of this expression is:
<condition> <action>
Where <condition> is:
<sensor> [<filter> ...]
And <action> is:
<verb> [<modifier> ...]
An illustrative variant of the above program is:
see - red - fruit - move - towards - quickly
Many different types of games can be made in Kodu Game Lab, such as racing, strategy, RPGs, adventure, platform, puzzle, 1st person shooters, and others.
See also
Educational programming language
Visual programming language
References
The Age (Australia): "Get With the Program"
Information Week: Microsoft Research Provides Sneak Preview Of 'Kodu' Programming Environment For Kids
Wired: TechFest Demo: Kodu
Seed Magazine on Kodu
Slate Magazine: Logo on Steroids
Edge Magazine: Do You Kodu?
External links
Kodu - Microsoft Research
Educational programming languages
Software for children
Microsoft Research
Pedagogic integrated development environments
Video game development software
2009 software |
https://en.wikipedia.org/wiki/MODS | MODS may refer to:
Metadata Object Description Schema, a bibliographic description schema
Microscopic Observation Drug Susceptibility assay
Multiple organ dysfunction syndrome
Microsoft Office Document Scanning
Military Orbital Development System, created by the US Air Force Space System Division
Multiplexed Optical Data Storage
Museum of Discovery and Science, in Fort Lauderdale, Florida, US
Model Organism Databases, databases that house and disseminate organism-specific biological knowledge
See also
Mod (disambiguation)
nl:Mods |
https://en.wikipedia.org/wiki/Silver%20Legacy%20Resort%20%26%20Casino | Silver Legacy Resort & Casino is a hotel and casino located in Downtown Reno, Nevada. It anchors a network of connected hotel-casinos in the downtown Reno core that included Circus Circus Reno and Eldorado Reno and are owned and operated by Caesars Entertainment. It has over 1,700 hotel rooms and suites and is the tallest building in Reno.
Previous joint venture owners of Silver Legacy Resort & Casino (along with Eldorado Resorts) were Mandalay Resort Group, formerly known as Circus Circus Enterprises (1995–2005) and MGM Resorts International, formerly known as MGM Mirage (2005–2015).
History
In 1992, Don Carano, a long time Reno attorney and CEO/Chairman of the Eldorado Hotel Casino and Clyde Turner, CEO of Circus Circus Enterprises joined together to design the Silver Legacy. At the time, Las Vegas in Southern Nevada was growing fast and far overtaking Reno with larger and more lavish casino-hotels. Carano wanted to create a similar, competitive hotel casino-resort. The total cost was projected at $230 million. On July 22, 1993, the special use permit was approved to go ahead with the construction on land owned by Carano, two city blocks which would link the new resort with Eldorado and Circus Circus.
Carano and Turner announced the official name of the resort on December 15, 1994. Following a citywide competition to name Reno's newest resort in more than a decade, the winning name "Silver Legacy" was chosen. In June 1995, the Nevada Gaming Commission approved the gaming permit for the resort. It opened on July 28, 1995.
Carano's eldest son, Gary, served as CEO of the property and later on, his next eldest son, Glenn Carano, would join the executive team at the resort as Director of Marketing. In 2014, Glenn became the General Manager while Gary became CEO of Eldorado Resorts, Inc.
The Silver Legacy also made the big screen, first in Kingpin in 1996 starring Woody Harrelson and Bill Murray, the movie showcasing the newest attractions of Reno-The Silver Legacy, and the nearby National Bowling Stadium, also completed in 1995. Glenn Carano made a short appearance in the film and many scenes were shot inside the resort. Later, in 2002, Waking Up in Reno starring Patrick Swayze, Billy Bob Thornton, Charlize Theron and Natasha Richardson, was partially filmed inside Silver Legacy.
In 2014, Glenn Carano was promoted to General Manager of Silver Legacy Reno.
At 42 stories tall, the Resort Casino is the largest building in Downtown Reno. It also spent two years as the tallest building in Nevada, and is still the tallest building in Nevada outside of the Las Vegas Valley. The Legacy is typically lit green at night and is referred to by many as the "Emerald City" of Reno. Visitors occasionally compare the green lighting to the appearance of Minas Morgul, from Peter Jackson’s adaptation of the Lord of the Rings series. In support of the Nevada Wolf Pack, the Silver Legacy will sometimes turn blue. In 2013, a contest was held online to vote on if the |
https://en.wikipedia.org/wiki/Tairy%C5%ABji%20Ropeway | The is Japanese aerial lift line in Tokushima Prefecture, operated by Shikoku Cable. Opened in 1992, the line climbs to Tairyū-ji, the 21st temple of the Shikoku Pilgrimage.
Basic data
System: Aerial tramway, 2 track cables and 2 haulage ropes
Distance:
Vertical interval
Between two ends:
Maximum:
Maximum gradient: 30°
Operational speed: 5.0 m/s
Passenger capacity per a cabin: 101
Stations: 2
Time required for single ride: 10 minutes
See also
List of aerial lifts in Japan
External links
Shikoku Cable official website
Aerial tramways in Japan
1992 establishments in Japan
Anan, Tokushima |
https://en.wikipedia.org/wiki/Kim%20Watkins | Kim Watkins (22 September 1967) is an Australian television and news presenter.
Career
Watkins began her career in 1979, aged 12 as the co-host of the Nine Network's children's show You Asked For It.
In 1989, Kim began a six-year stint at the Seven Network in Brisbane working as a news reporter, weekend news presenter and a morning show host. While at Seven, she also worked on the 1992 Olympic Games.
In 1995, Watkins joined the Nine Network, working as a reporter on many shows including Good Medicine, Australia's Most Wanted, Money, and giving updates for the Wide World of Sports telecast of the 1998 Commonwealth Games in Kuala Lumpur. Watkins also presented National Nine Morning News and was a fill-in presenter on other National Nine News bulletins.
In April 2005, Watkins took the Nine Network to the Human Rights and Equal Opportunity Commission, following a maternity leave dispute in which Watkins was reported to be "unhappy with the work she was assigned when she returned from maternity leave after giving birth to her third child." Watkins and the Nine Network reached an agreement and she left the Network.
In September 2005, Kim rejoined Seven Network as a reporter on Beyond Tomorrow. She stayed with the network until the end of the year.
In January 2006, Watkins joined Network Ten to co-host a new morning show 9am with David and Kim with David Reyne. The show replaced long running Good Morning Australia. She also hosted Saving Babies and was a regular fill-presenter for Carrie Bickmore on Network Ten's panel show The Project.
Kim was an avid amateur motor racing driver and has driven in a number of celebrity events including the celebrity race before the 2006 Australian Grand Prix. Starting from second on the grid, behind three times Australian Superbike champion Shawn Giles, Watkins finished in third place behind winner, Giles, and AFL footballer, Alastair Lynch. Watkins said, "I am absolutely ecstatic with third...this is one for all the Mummies out there".
Kim turned down the opportunity to audition for co-host Breakfast. The position was later given to Kathryn Robinson.
Personal life
Watkins has three children, including identical mono-amniotic mono-chorionic twin girls.
References
External links
Hoffmann, Luise, Kim and Kerri-Anne's TV faux pas, ABC Brisbane, 15 May 2007
Mum In Profile - Kim Watkins, essentialbaby.com.au, September 2006
Kim Watkins, Channel Ten biography
1967 births
Nine News presenters
Living people |
https://en.wikipedia.org/wiki/All%20About%20Lisa | "All About Lisa" is the twentieth and final episode of the nineteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 18, 2008. Lisa Simpson becomes Krusty the Clown's newest assistant and steals his spotlight. She wins Entertainer of the Year at the Springfield Media awards, but is warned that with her sudden fame comes a new attitude towards others and herself. Meanwhile, Homer and Bart bond over their newfound love of coin collecting. The episode features narration by Sideshow Mel. It was written by John Frink and directed by Steven Dean Moore. Drew Carey guest voices himself, appearing as a guest on Krusty's show.
Plot
The episode begins at the 38th Annual Springfield Media Awards, where the Entertainer of the Year Award goes to Lisa Simpson. Sideshow Mel then explains how Lisa became an entertainer. At Krusty the Clown's 4,000th episode, Krusty decides to hire brand-new "Krustkateers", children who used to star alongside Krusty in his early episodes. Bart has the best performance of all the children auditioning, but Krusty chooses Nelson Muntz instead. Lisa decides to defend Bart and demands Krusty hire him. However, Krusty decides to hire Lisa as his intern instead. As Krusty's intern, Lisa is frequently bullied by Krusty. Noticing how Krusty degrades Lisa, Mel tells her that Krusty is very conceited, so in order to bear Krusty's rudeness, Lisa must compliment him. Lisa takes Sideshow Mel's advice, and a conceited Krusty finally praises Lisa's assistance.
When Krusty fails to entertain the audience at one of his shows, Lisa attempts to make Krusty look better. After pushing Krusty off the diving board, the entire audience laughs at Krusty and praises Lisa, whose mind is swept with fame and fortune. Krusty is warned by his agent that Lisa's popularity may steal his spotlight. One evening, Krusty is running late for a rehearsal, and the program directors offer Lisa the opportunity to fill in. Dressed in a clown outfit, she performs Krusty's monologue, then when Krusty finally arrives he finds out the network has hired Lisa to replace him, renaming the show "The Lisa Show". As Krusty is relegated to a local late-night talk show, Lisa becomes an overnight success, but Sideshow Mel warns Lisa not to overdo her pride.
The story returns to Lisa proudly accepting her award. After the awards show, Mel reveals to Lisa that he had previously won the Entertainer of the Year Award, and that past winners including himself had their careers killed because of the award by starring in mediocre TV shows and movies. Lisa realizes that she needs to get out of the business while she still can. She runs back out on stage and calls Krusty up, allowing him to be in the spotlight again. Krusty regains his reputation and his show, where he continues to torture Mel for comedy.
Meanwhile, Bart and Homer decide to sell all of Krusty's merchandise in Bart's room. When Comic Book Guy |
https://en.wikipedia.org/wiki/Double%2C%20Double%2C%20Boy%20in%20Trouble | "Double, Double, Boy in Trouble" is the third episode of the twentieth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on October 19, 2008 and in the United Kingdom on November 30, 2008. Bart meets a rich boy named Simon Woosterfield, who happens to be Bart's exact look-alike. Because of this, the two decide to switch homes; Simon enjoys his time with the Simpsons while Bart discovers his rich new half-brother and sister are out to kill Simon, so they can inherit the vast Woosterfield family fortune. Former NFL football player Joe Montana guest stars as himself.
In its original airing, the episode garnered 8.09 million viewers.
Plot
Homer, Bart and Maggie are at the Kwik-E Mart, where Apu tries to get Homer to buy the last lottery ticket by claiming that the last ticket is always lucky. When Homer is about to take money out to buy the ticket, Bart attempts to jump off a shelf and land in Chief Wiggum's cart full of marshmallows. However, Wiggum moves the cart and Homer has to race over to catch his son, while Lenny walks up to the counter and buys that last ticket. Lenny wins $50,000, which makes Homer jealous. At Moe's Tavern, Lenny announces he is going to spend his winnings on a giant party at the Woosterfield Hotel for all of his friends. Back at home, the Simpson family cannot find Bart when it is time to leave, because he is upstairs in the attic with a water gun full of cat urine. When he is about to shoot it at Rod and Todd Flanders in a wagon below, Marge steps in and Bart accidentally sprays her with the urine, so Marge has to wear a mediocre "back up dress" to the party. Homer and Marge wonder why Bart cannot behave and wonder if he went bad in utero when pregnant Marge accidentally swallowed a small drop of champagne after Mayor Quimby christened a new Navy vessel, the U.S.S. Float-and-Shoot. At Lenny's party, Bart discovers that Lenny will give out vacuuming robots in gift bags. Bart activates all the dangerous settings on them and they attack the party guests. When everyone finds out that Bart is responsible, Marge takes away Bart's non-dice board game privileges, after Bart says she already took away his TV and video game privileges. In the bathroom, Bart meets Simon Woosterfield, a kid who is both Bart's exact look-alike and part of a billionaire family.
The boys decide to secretly switch places and live each other's lives for a while by trading their clothes in the bathroom. Bart likes his new life as a rich child until he meets his paternal half-siblings, Devan and Quenly, who resent Simon for blocking their full inheritance of the family fortune, especially since his father divorced their mother and married his mother. Simon refuses to eat Marge's recipe of cooked noodles with root beer and Cheetos, so Homer eats it and chews with his mouth open. When Simon is sent to bed without supper after calling Homer a spew monkey for spitting food on him, Marge giv |
https://en.wikipedia.org/wiki/Block%20%28Internet%29 | On the Internet, a block or ban is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software.
Blocking may also refer to denying access to a web server based on the IP address of the client machine. In certain websites, including social networks such as Facebook or editable databases like wikis, users can apply blocks (based in either IP number or account) on other users deemed undesirable to prevent them from performing certain actions. Blocks of this kind may occur for several reasons and produce different effects: in social networks, users can block other users without restriction, typically by preventing them from sending messages or viewing the blocker's information or profile. Administrators, moderators or other privileged users users can apply blocks that affect the access of the undesirable users to the entire website.
Blocking by countries
Some countries, notably China and Singapore, block access to certain news information. In the United States, the Children's Internet Protection Act requires schools receiving federal funded discount rates for Internet access to install filter software that blocks obscene content, pornography, and, where applicable, content "harmful to minors".
Blocking as denial of access to a website
Blocked or banned users may be completely unable to access all or part of a site's content, which is usually the case when censoring or filtering mechanisms are responsible for the block.
Blocking is used by moderators and administrators of social media and forums to deny access to users that have broken their rules and will likely do so again, in order to ensure a peaceful and orderly discussion in place. Common reasons for blocking are spamming, trolling, and flaming, or, in the case of wiki sites like Wikipedia, vandalism and other types of disruptive editing. Some criticize cases of the use of bans by administrators of large websites, such as Twitter, saying that these bans may be politically or financially motivated. However, websites have a legal right to decide who is allowed to post, and users often respond by "voting with their feet" and going to a place where the administrators see their behavior as acceptable.
On Facebook, it is possible for users with privileges to block users from doing things like posting or contacting other people.
On wiki sites like Wikipedia and Wikimedia Commons, administrators (volunteers with special privileges on their accounts) can block other users from contributing to the entire site such as uploading images or editing, creating, or moving pages but this generally doesn't affect their ability to read pages on the site. Such blocks can normally only be placed with good reason such as the user vandalizing pages or uploading non-free copyrighted content after multiple warnings, and that reason is generally seen when they attempt to edit and this reason is gene |
https://en.wikipedia.org/wiki/The%20Ten%20Commandments%20%282007%20film%29 | The Ten Commandments is a 2007 computer-animated biblical epic fantasy film directed by John Stronach and Bill Boyce, and written by Ed Naha. The film follows Moses from his childhood, as the adopted grandson of Pharaoh, to his adulthood, as the chosen one of Yahweh and liberator of his people.
With narration by Ben Kingsley, the film stars Christian Slater as Moses, Alfred Molina as Ramses and Elliott Gould as God. It was theatrically released on October 19, 2007 to largely negative reviews, with criticism directed towards the animation, screenplay, plot, voice acting and inaccuracies to the Bible. It was also a box office failure, having grossed only $1.1 million against a budget of $10 million.
Plot
The Pharaoh is a nervous man, outnumbered by his Hebrew slaves; he orders them to be worked harder, that doesn't break their spirits, so he has all the newborn male babies thrown into the Nile; Moses' parents, Amram and Jochebed, are desperate to save their baby son, and put him in a basket and send him down the river while his sister, Miram, follows to make sure he's okay. The next morning, the Pharaoh's daughter adopts and raises him as her own, with Jochebed as his nurse growing up. His playmate and uncle is Ramses, the Pharaoh's son. As teens, they wrestle, but Ramses does not like Moses much, and Moses is exiled from town after Moses comes to the aid of a slave being beaten, and the beater is killed. Moses is mistaken for a Hebrew slave based on his appearance. His brother Aaron comes forward, revealing his past and how they are actually brothers-making Moses a Hebrew.
They all grow up, Ramses is now Pharaoh, God speaks to Moses, telling him to get the Hebrews from Egypt into the promised land. Ramses says no, the ten plagues come, and Ramses gives in only when his son is killed (as God's spirit kills all the firstborn Egyptian sons). Moses leads the people from Egypt, ditches Ramses and his army at the parting of the Red Sea, and Moses receives the Ten Commandments and delivers them to the Hebrews. Moses puts Joshua in charge of leading the people the rest of the way.
Cast
Ben Kingsley as the Narrator
Christian Slater as Moses
Alfred Molina as Ramses
Elliott Gould as God
Scott McNeil as Seti
Christopher Gaze as Aaron
Kathleen Barr as Miriam
Lee Tockar as Dathan
Matt Hill as Joshua
Tabitha St. Germain (credited as "Kitanou St. Germain") as the Princess
Trevor Devall as Amram
Jane Mortifee as Zipporah
Brian Dobson as the Task Master
Garry Chalk as the General
Nico Ghisi as Ramses' Son
Colin Murdock as the Elderly Slave
Box office
The film opened in 830 theaters in the United States and grossed $478,910 on its opening weekend. Brandon Gray of Box Office Mojo wrote that it and Sarah Landon and the Paranormal Hour had "two of the worst national debuts of all time". The film ended up grossing $952,820 in the United States and $99,087 elsewhere, for a total of $1,051,907.
Reception
The Ten Commandments received mostly negative reviews from cr |
https://en.wikipedia.org/wiki/List%20of%20Criss%20Angel%20Mindfreak%20episodes | The following is a list of episodes from Criss Angel Mindfreak. A total of 96 episodes have aired.
Season 1 (2005)
Criss Angel Mindfreak Season 1 premiered on the A&E network on Wednesday July 20, 2005. It consists of 18 episodes.
Season 2 (2006)
Criss Angel Mindfreak Season 2 premiered on the A&E network on Wednesday May 31, 2006. It consists of 22 episodes.
Season 3 (2007)
Criss Angel Mindfreak Season 3 premiered on the A&E network on Tuesday June 5, 2007. It consists of 25 episodes: 19 episodes that aired on television, and 6 episodes that were only released on the Collector's Edition Megaset DVD box set.
Unaired Season 3 episodes (Collector's Edition Megaset exclusives)
These 6 episodes were previously unreleased and were only available in the Criss Angel Mindfreak: Collector's Edition Megaset.
Season 4 (2008)
Criss Angel Mindfreak Season 4 premiered on the A&E network on Wednesday July 23, 2008. It consists of 18 episodes.
Season 5 (2009)
Criss Angel Mindfreak Season 5 premiered on the A&E network Wednesday August 12, 2009. The season is known as The Five Lives of Criss Angel Mindfreak. It is only 5 episodes long.
Season 6 (2010)
Criss Angel Mindfreak Season 6 premiered on the A&E network Wednesday August 4, 2010. It is 6 episodes long.
References
Criss Angel Mindfreak |
https://en.wikipedia.org/wiki/Tom%20Ellis%20%28journalist%29 | Thomas Caswell Ellis (September 22, 1932 – April 29, 2019) was a Boston-based journalist, well-known throughout New England for his tenure as anchor for three of Boston's network-affiliated stations. His career in television news spans more than 40 years.
His career included stints as a correspondent for WNBC-TV and as an anchor for WABC-TV — both in New York City, and for KONO-TV Channel 12 (now KSAT-TV) in San Antonio. His radio career included anchor/reporter duties for KVET-AM in Austin, KWED-AM in Sequin, and KONO-AM/FM in San Antonio, all in Texas.
Ellis may be the only individual in television history to anchor top-rated newscasts in 3 major markets: San Antonio, Boston, and New York. His newscasts in Boston all drew top ratings.
Early life
Ellis was born in Walker County and raised in the Big Thicket area of Texas. He was a 1958 graduate of the University of Texas.
Early career
When he was 17 Ellis worked as a sideshow barker, earning $150 per week. Ellis' first job in television came in 1951, when a producer from New York approached him to host a baseball pregame show for children sponsored by the Curtiss Candy Company. Ellis hosted the Curtis Knot Hole Gang club, a thirty-minute program before the Dallas Eagles and the Fort Worth Cats of the Texas League. He would interview local youth baseball players.
Ellis worked as a radio reporter at KWED, a 1000-watt radio station in Seguin, Texas. In 1958, the owner of KONO radio in San Antonio caught one of his broadcasts. The executive offered Ellis a news job in his San Antonio station for $100 per week. Ellis took the position after negotiating a salary of $105 a week.
Television News
In 1961, Ellis got his opportunity to go on television. The anchor at Ellis' station's affiliated TV station had abruptly quit. The news director asked Ellis to fill in until a replacement could be found.
Eventually, Ellis got the anchor position permanently, but he kept his radio job because the TV anchor job paid only $15 a night.
WBZ-TV
His high-profile career in New England began in July 1968, when he became the new lead anchor at WBZ-TV. He began solo, he would hold alone, partnering later with station veterans such as Jack Chase, through 1975. Ellis established himself as dependable and kept the (then) NBC affiliate at top of the Boston news ratings. He won accolades for his organization of team coverage during the 1972 presidential election and Richard Nixon's resignation in 1974. WBZ even issued political campaign-pins and bumper stickers to promote Ellis and his co-anchor Tony Pepper. They showed up all over the viewing area.
Ellis left Boston in 1975 for an offer to anchor for ABC's flagship affiliate WABC-TV in New York City. He stayed for three years. In the midst of his tenure, Ellis took on a role in the 1976 feature film Marathon Man, starring Dustin Hoffman and Laurence Olivier.
Ellis decided not to renew his contract with WABC, before he could have been considered for spots at ABC |
https://en.wikipedia.org/wiki/Collision%20resolution | "Collision resolution" may refer to:
Hash table implementations in computer science
Collision response in classical mechanics
Compare:
Collision avoidance (networking) in telecommunications |
https://en.wikipedia.org/wiki/KLFV | KLFV (90.3 FM) is a radio station in Grand Junction, Colorado. The station broadcasts a contemporary Christian format from the K-Love radio network; the station and network are owned by the Educational Media Foundation.
History
90.3 FM began broadcasting as KJOL ("Joy of the Lord") on April 24, 1982, after missing a planned Christmas 1981 launch. It was the second religious radio station in the Grand Junction area, after KCIC, which had signed on in 1979; however, KJOL broadcast with more power than KCIC. KJOL was owned by the Columbus Evangelical Free Church and broadcast from its facilities; operations were managed by an interdenominational alliance of local churches, the Western Slope Church Ministries Association. From the start, KJOL adopted a more contemporary gospel sound than the traditionally oriented KCIC; the programmer, Stan Bruning, had come from KWBI-FM in Denver.
The mid-1980s saw a major ownership transition for the young religious station. In 1984, Columbus Evangelical sold it for $24,000 to Western Bible College, owners of KWBI-FM; the church sought to ensure KJOL's continued financial stability with the sale. After the sale closed in 1985, KJOL, which had previously been a major conservative voice and drove protests at abortion clinics and grocery stores that sold pornographic materials, toned down its rhetoric and slightly increased the proportion of music in its broadcast day. The changes and Western Bible College-developed format took hold in February, after the station was silent for a week; the former general manager who had spearheaded the protest activities exited in June.
After a couple of mergers, Western Bible College became Colorado Christian University by 1989, and later expanded its educational offerings to the Western Slope and opened a center in Grand Junction in 1991. The university sold its entire regional radio network to EMF in 2000; local operations were shuttered that October in favor of rebroadcasting EMF's K-Love programming as KLFV, and the religious talk and teaching programming disappeared altogether. Former KJOL station manager Ken Andrews began efforts to bring a new local Christian station to Grand Junction; those efforts succeeded when he reached an agreement to broker out 620 AM and relaunch it as the new KJOL effective July 1, 2001.
References
External links
Contemporary Christian radio stations in the United States
LFV
K-Love radio stations
Radio stations established in 1981
1981 establishments in Colorado
Educational Media Foundation radio stations |
https://en.wikipedia.org/wiki/KVBV | KVBV (1450 AM) is a radio station licensed to serve Buena Vista, Colorado, United States. The station, which began broadcasting in 1986, is currently owned by High Plains Radio Network, LLC. KVBV broadcasts a news/talk radio format.
History
The beginning
This station received its original construction permit from the Federal Communications Commission on March 5, 1986. The new station was assigned the KDMN call sign by the FCC on April 10, 1986. KDMN received its license to cover from the FCC on September 29, 1986.
In August 1987, Buena Vista Broadcasters reached an agreement to sell this station to Robert D. & Marjorie M. Zellmer. The deal was approved by the FCC on September 15, 1987, and the transaction was consummated on October 21, 1987.
The 1990s
In January 1989, Robert D. & Marjorie M. Zellmer, reached an agreement to sell this station to Randall S. & Dorothy J. Jacobson. The deal was approved by the FCC on March 16, 1989, and the transaction was consummated on April 10, 1989. In December 1989, Randall S. & Dorothy J. Jacobson applied to transfer the broadcast license for KDMN to the Alpine Broadcasting Corporation. The transfer was approved by the FCC on March 21, 1990, and the transaction was consummated on May 16, 1990.
In October 1995, Alpine Broadcasting Corporation reached an agreement to sell this station to Rocky Mountain Radio Network, Inc. The deal was approved by the FCC on March 6, 1996, but the deal was never consummated and control of KDMN remained with Alpine. In September 1997, Alpine Broadcasting Corporation reached a new agreement to sell this station, this time to Pilgrim Communications, Inc. The deal was approved by the FCC on December 11, 1997, and the transaction was consummated on May 18, 1998.
Change to KSKE
The station was assigned new call sign KSKE on September 9, 2004. The change accompanied a format change to business talk radio.
In December 2008, Pilgrim Communications, Inc., reached an agreement to sell this station to Rocky Mountain Radio, LLC. The deal was approved by the FCC on February 26, 2009, but was never consummated.
Effective June 5, 2017, Pilgrim Communications sold KSKE to High Plains Radio Network, LLC for $35,000. The call letters were changed to KVBV on June 25, 2020.
God's phone number
In May 2003, KDMN and its Radio Colorado Network sister stations became a target of prank calls when the Jim Carrey movie Bruce Almighty revealed God's phone number in several scenes. The number, 776–2323, was coincidentally the same as the station group's call center and several other people across the United States. The station group turned the unexpected attention into a contest with callers asked "what they would say to God" if it were actually possible to call him on the telephone.
References
External links
VBV
News and talk radio stations in the United States
Radio stations established in 1986
1986 establishments in Colorado
Chaffee County, Colorado |
https://en.wikipedia.org/wiki/Smartbomb%20%28EP%29 | The Smartbomb EP is the first studio release by Canadian Cyberpunk/Industrial metal band Left Spine Down. The album was released on June 26, 2007 via the band's website and online music retailers such as iTunes and Amazon.com.
Track listing
References
External links
Left Spine Down Official Site
Smartbomb EP on iTunes
Smartbomb EP on Amazon MP3 Store
Mindphaser B review
Side-Line review|
2007 EPs
Left Spine Down albums |
https://en.wikipedia.org/wiki/Fragmented%20object | In computing, fragmented objects are truly distributed objects. It is a novel design principle extending the traditional concept of stub based distribution.
In contrast to distributed objects, they are physically distributed and encapsulate the distribution in the object itself. Parts of the object - named fragments - may exist on different nodes and provide the object's interface. Each client accessing a fragmented object by its unique object identity presumes a local fragment. Fragmented objects may act like a RPC-based infrastructure or a (caching) smart proxy as well. Therefore, clients cannot distinguish between the access of a local object, a local stub or a local fragment. Full transparency is gained by the following characteristics of fragmented objects.
Arbitrary internal communication
Arbitrary protocols may be chosen for the internal communication between the fragments. For instance, this allows to hide real-time protocols (e.g., RTP for media streaming) behind a standard CORBA interface.
Arbitrary internal structure
The internal structure of a fragmented object is arranged by the object developer/deployer. It may be client–server, hierarchical, peer-to-peer and others. Thus, a downward compatibility to stub based distribution is ensured.
Arbitrary internal configuration
As both the distribution of state and functionality are hidden behind the object interface their respective distribution over the fragments is also arbitrary. In addition, an application using a fragmented object can also tolerate a change in distributions which is achieved by exchanging the fragment at one or multiple hosts. This procedure can either be triggered by a user who changes object properties
or by the fragmented object itself (that is the collectivity of its fragments) e.g., when some fragment is considered to have failed. Of course an exchange request may trigger one or more other internal changes. The object developer can migrate the state and the functionality over the fragments by providing different fragment implementations. Those dynamically change the inside the fragmented objects. A flexible internal partitioning is achieved providing transparent fault-tolerant replications as well.
Projects
Aspectix – The Aspectix group works on several projects that focus on middleware architecture, adaptive and quality-of-service-aware applications, fault tolerance, aspect-oriented programming, and automated source-code transformation.
FORMI – FORMI is an extension of Java RMI.
Globe – This project looks at a powerful unifying paradigm for the construction of large-scale wide area distributed systems: distributed shared objects.
SOS – The SOMIW object-oriented Operating System.
References
Structure and Encapsulation in Distributed Systems: the Proxy Principle
Fragmented objects for distributed abstractions
Globe: A Wide-Area Distributed System
Integrating fragmented objects into a CORBA environment
FORMI: An RMI Extension for Adaptive Applicatio |
https://en.wikipedia.org/wiki/Text%20Executive%20Programming%20Language | In 1979, Honeywell Information Systems announced a new programming language for their time-sharing service named TEX, an acronym for the Text Executive text processing system. TEX was a first-generation scripting language developed around the time of AWK and used by Honeywell initially as an in-house system test automation tool.
TEX extended the Honeywell Time-Sharing service (TSS) line editor with programmable capabilities, which allowed the user greater latitude in developing ease-of-use editing extensions as well as writing scripts to automate many other time-sharing tasks formerly done by more complex TSS FORTRAN programs.
Overview
TEX was a subsystem of Honeywell Timesharing (TSS). Users would enter the TSS command tex to change to a TEX session mode of operation. TEX expressions could be entered directly on the command line or run from a script file via the TEX command call .
TEX programs are a collection of TSS line editing commands, TSS session commands, and TEX statements. TEX variables could be inserted into TSS commands, and TSS line editor commands via the TEX variable substitution feature. TEX programs were primarily designed to extend the line editor system. Consequently, TEX had no concept of file input/output relying instead on applying line edit commands to the working file and saving as needed.
The key developers of TEX at Honeywell were Eric Clamons and Richard Keys with Robert Bemer, famous as the father of ASCII and grandfather of COBOL, acting in an advisory capacity.
TEX should not be confused with TeX a typesetting markup language invented by Donald Knuth.
The American Mathematical Society has also claimed a trademark for TeX, which was rejected because at the time this was tried (the early 1980s), "TEX" (all caps) was registered by Honeywell for the "Text EXecutive" text processing system.
TEX Variables
All variables were stored as strings and converted to integer numeric values when required. Floating point variables, arrays, or other datatypes common in current scripting languages did not exist in a TEX environment.
All variables were stored in a single global variable pool which users had to manage in order to avoid
variable naming conflicts. There were no variable scoping capabilities in TEX. Variable names were limited to 40 characters.
TEX provided several internal read-only registers called star functions
which changed state when certain TEX string parsing operations were executed. Star functions provided a means to get the current date and time, resultant strings from a split or scan string parsing operation or from TEX internal call level and TSS session information.
The maximum length of a string value was 240 ASCII characters. This includes intermediate results when evaluating a TEX expression. Numeric string values are limited to 62 digits in the string, including the (-) for negative numbers. Numeric values are also normalized where leading zeros are stripped from the string representation.
Some |
https://en.wikipedia.org/wiki/CCSDS%20Mission%20Operations | The Spacecraft Monitoring & Control (SM&C) Working Group of the Consultative Committee for Space Data Systems (CCSDS), which sees the active participation of the main space agencies, is defining a service-oriented architecture consisting of a set of standard end-to-end services between functions resident on board a spacecraft or based on the ground, that are responsible for mission operations.
Identification of the problem
There is a general trend toward increasing mission complexity at the same time as increasing pressure to reduce the cost of mission operations, both in terms of initial deployment and recurrent expenditure. Closed, or ‘monolithic’ mission operations system architectures do not allow the re-distribution of functionality between space and ground, or between nodes of the ground system. This lack of architectural openness leads to:
lack of interoperability between agencies;
lack of re-use between missions and ground systems;
increased cost of mission specific development and deployment;
unavailability of commercial generic tools;
inability to replace implementation technology without major system redesign;
lack of operational commonality between mission systems, increased training costs.
The result is many parallel system infrastructures that are specific to a given family of spacecraft or operating agency, with little prospect of cross-fertilisation between them.
The service framework approach
Service-oriented architecture (SOA) is gradually replacing monolithic architecture as the main design principle for new applications in both private and distributed systems. It is one of the fundamental design principles of network distributed applications where the interfaces, both operations and data objects, must be well defined as the clients are often heterogeneous. SOA is an approach to system design that relies not on the specification of a monolithic integrated system, but instead on the identification of smaller, modular components that communicate only through open, published, service interfaces.
The SM&C WG is defining a set of standard services, which constitutes a framework that enables many similar systems to be assembled from compliant ‘plug-in’ components. These components may be located anywhere, provided they are connected via a common infrastructure. This allows components to be re-used in different mission-specific deployments: between agencies, between missions, and between systems.
If services are specified directly in terms of a specific infrastructure implementation, then they are tied to that technology. Instead, by layering the services themselves, the service specifications can be made independent of the underlying technology. Specific technology adapters enable the deployment of the service framework over that technology. This in turn makes it possible to replace the infrastructure implementation as well as component implementations. It is also possible to transparently bridge between differe |
https://en.wikipedia.org/wiki/Amiga%20Hunk | Hunk is the executable file format of tools and programs of the Amiga Operating System based on Motorola 68000 CPU and other processors of the same family. The file format was originally defined by MetaComCo. as part of TRIPOS, which formed the basis for AmigaDOS.
This kind of executable got its name from the fact that the software programmed on Amiga is divided in its internal structure into many pieces called hunks, in which every portion could contain either code or data.
Hunk structure
The hunks in an Amiga executable file could exist in various types. There are 32-bit hunks, 16-bit hunks, and even some 8-bit hunks.
Types of hunks were standardized in AmigaOS, and well documented in The AmigaDOS Manual edited by Commodore to explain to programmers how to code on the Amiga, during the years in which Commodore manufactured Amiga computers. Their structure was officially codified and could be changed only by a Commodore committee, which then communicated the modifications to the developers for new releases of the Amiga operating system.
The structure of an Amiga hunk is very simple: There is a header at the beginning of the hunk indicating that that kind of "portion of code" is a known and valid Amiga hunk type, then follows an ID which indicates the length of the hunk itself, and at the bottom is the segment of the hunk which contains the real code or data.
Features of Amiga executable files
Amiga executable files can be launched either from the graphical shell of the Amiga, the Workbench or from the Amiga's command line interpreter (called CLI, later AmigaShell).
No particular filename extension is required for Amiga executable files. For example, the calculator applet "Calculator" can be renamed to "Calculator.com", "Calculator.exe", "Calculator.bin", or even "Calculator.jpeg". These are all valid names for programs or tools, because AmigaOS does not differentiate between filename extensions.
AmigaOS adopted another method to recognize it is dealing with a valid executable. There is a particular sequence of bytes in the file header, yielding the hexadecimal value $000003f3. This sequence, which signifies an executable file and lets it be self-running, is called a magic cookie (from the magic cookies in Alice's Adventures in Wonderland by Lewis Carroll).
This kind of solution to identify executables on the Amiga was taken from similar solutions which were adopted by UNIX/Unix-like operating systems, where magic cookies are called magic numbers.
Structure of an Amiga executable file
The internal structure of an Amiga executable file is very simple. In the beginning of the file there is the magic cookie, then is declared the total number of hunks in the executable, and just after this is the progressive numbers of hunks starting from "0" (zero).
The first hunk is always numbered zero, so if the executable is (for example) subdivided into three hunks, they will be numbered "0" for the first one, "1" the second and "2" the third hunk, a |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.